<<

UNIVERSITA` DEGLI STUDI DI TRIESTE DIPARTIMENTO DI ELETTROTECNICA, ELETTRONICA ED INFORMATICA

XX Ciclo del Dottorato di Ricerca in Ingegneria dell’Informazione (Settore scientifico-disciplinare: ING-INF/03)

TESI DI DOTTORATO

Beamforming Techniques for Communications in Low-Rank Channels: Analytical Models and Synthesis Algorithms

Dottorando Coordinatore MASSIMILIANO COMISSO Chiar.mo Prof. Alberto Bartoli (Università degli Studi di Trieste)

Tutore Chiar.mo Prof. Fulvio Babich (Università degli Studi di Trieste)

Relatore Chiar.mo Prof. Lucio Mania` (Università degli Studi di Trieste)

Correlatore Chiar.mo Prof. Roberto Vescovo (Università degli Studi di Trieste)

Summary

The objective of this thesis is discussing the application of multiple tech- nology in some selected areas of wireless networks and fourth-generation telecom- munication systems. The original contributions of this study involve, mainly, two research fields in the context of the emerging solutions for high-speed digital com- munications: the mathematical modeling of distributed wireless networks adopt- ing advanced antenna techniques and the development of iterative algorithms for pattern synthesis. The material presented in this dissertation is the result of three-year studies performed within the Telecommunication Group of the Department of Electronic Engineering at the University of Trieste during the course of Doctorate in Information Engineering.

In recent years, an enormous increase in traffic has been experienced by wire- less communication systems, due to a significant growth in the number of users as well as to the development of new high bit rate applications. It is foreseen that in the near future this trend will be confirmed. This challenging scenario in- volves not only the well established market of cellular systems, but also the field of emerging wireless technologies, such as WiMAX (Worldwide interoperabil- ity for Microwave Access) for wireless metropolitan area networks, and Wi-Fi (Wireless Fidelity) for wireless local area networks, mobile ad-hoc networks and wireless mesh networks. The rapid diffusion of architectures adopting an ad-hoc paradigm, in which the network infrastructure is partially or totally absent and that can be deployed using low-cost self-configuring devices, has further enlarged the number of systems that have to coexist within a limited frequency spectrum. In such evolving environment, the development of interference mitigation methods to guarantee the communication reliability, the implementation of proper re- source allocation schemes for managing the user mobility as well as for support- ing multimedia and high speed applications, represent the most relevant topics. Classic approaches are focused on the use of the time-frequency resources of the propagation channel. However, to satisfy the increasing demand of network ca- pacity, while guaranteeing at the same time the necessary levels in the quality of the offered services, operators and manufacturers must explore new solutions.

iii iv Summary

In this scenario, the exploitation of the spatial domain of the communication chan- nel by means of multiple antenna systems can be a key improvement for enhancing the spectral efficiency of the wireless systems. In a rich scattering environment, the use of multiple antennas enables the adoption of diversity and spatial multi- plexing techniques for mitigating and, respectively, exploiting multipath fading effects. In propagation environments characterized by small angular spreads, the combination of antenna arrays and beamforming algorithms provides the possi- bility to suppress the undesired sources and to receive the signals incoming from the desired ones. This leads to an increase of the signal to interference plus noise ratio at the receiver that can be exploited to produce relevant benefits in terms of communication reliability and/or capacity. A proper design of the medium ac- cess control layer of the wireless network can enable the simultaneous exchange of packets between different node pairs as well as the simultaneous reception of packets from multiple at a single node. Switched-beam antennas, adaptive antennas (also referred to as smart antennas), and phased-antenna arrays represent some of the available beamforming techniques that can be applied to increase the overall system capacity and to mitigate the interference, in a scenario where several different technologies must share the same frequency spectrum.

In the context of distributed wireless networks using multiple antenna systems, the core of this thesis is the development of a mathematical model to analyze the performance of the network in presence of multipath fading, with particular reference to a scenario in which the signal replicas incoming at the receiver are confined within a small angle and are characterized by small relative delays. This propagation environment, referred to as low-rank, is the typical operating scenario of smart antennas, which necessitate high spatial correlation channels to work properly. The novel aspects of this study are represented by the theoretical and numerical modeling of the sophisticated adaptive antennas in conjunction with a detailed description of the channel statistics and of the IEEE 802.11 medium ac- cess control scheme. A theoretical model providing a more realistic perspective may be desirable, considering that, at present, not only cost and competition is- sues, but also too optimistic expectations, as compared to the first measurements on the field, have induced the wireless operators to delay the adoption of technology. The presented analysis includes the most relevant elements that can influence the network behavior: the spatial channel model, the fading statistic, the network topology, the access scheme, the beamforming algorithm and the antenna array geometry. This last aspect is numerically investigated considering that the size of the user terminal represents a strict constraint on the number of antennas that can be deployed on the device, and so the maximization of the performance be- Summary v comes related to the geometrical distribution of the radiators. In ad-hoc and mesh networks, the typical communication devices, such as laptops, palmtops and per- sonal digital assistants require compact and cheap antenna structures as well as beamforming algorithms easy to implement. In particular, the low-cost character- istics have guaranteed a wide popularity to wireless mesh technology, which have encouraged the birth of a new social phenomenon, known as wireless community networks, whose objective is the reduction of the Internet access cost. The adoption of multi-antenna systems is the purpose of the IEEE 802.11n amend- ment, which, however, not considering modifications of the medium access con- trol layer, provides higher bit rates for the single link, but does not allow simulta- neous communications between different couples of nodes. This aspect must be taken into account together with the fact that, nowadays, IEEE 802.11x represents the leading family of standards for wireless local communications, and enhance- ment proposals have to pay careful attention to the backward compatibility issues. The mathematical model presented in this thesis discusses the suitable parameter settings to exploit advanced antenna techniques in 802.11-based networks when the access scheme supports multiple communications at the same time, maintain- ing a realistic description for the antenna patterns and the channel behavior.

The presentation of two new iterative algorithms for antenna array pattern syn- thesis represents the core of the last part of this dissertation. The proposed solu- tions are characterized by implementation simplicity, low computational burden and do not require the modification of the excitation amplitudes of the array ele- ments. These advantages make the presented algorithms suitable for a wide range of communication systems, while matching also the inexpensiveness of mesh and ad-hoc devices. In particular, phase-only synthesis techniques allow the adoption of a cheaper hardware, including only phase shifters, which are available at a rea- sonable price, while avoiding the use of the more expensive power dividers. The first presented algorithm employs the spatial statistic of the channel for prop- erly placing the pattern nulls, in order to suppress the undesired power incoming from a given angular interval. This solution exploits the improved knowledge of the spatial properties of the propagation environment for enhancing the interfer- ence suppression capabilities at the and receiver sides. The second algorithm is a phase-only technique that is able to generate multiple nulls towards the undesired directions and multiple main lobes towards the desired ones. This method provides the possibility to perform spatial adopting low-cost electronic components.

The thesis is organized in three parts. The first one provides the background ma- terial and represents the basics of the following arguments, while the other two parts are dedicated to the original results developed during the research activity. vi Summary

With reference to the first part, the fundamentals of antenna array theory are briefly summarized in the first chapter. The most relevant aspects of the wire- less propagation environment are described in the second chapter, focusing on the characteristics of the spatial domain in a low-rank scenario. The third chap- ter presents a classification of the different multiple antenna techniques according to the channel properties and provides an overview of the most common beam- forming algorithms. The fourth chapter introduces the most significant aspects of the distributed wireless networks, presenting the main open issues and the current proposals for the exploitation of the potential offered by antenna array systems. The second part describes the original results obtained in the mathematical mod- eling of ad-hoc and mesh networks adopting smart antennas in realistic propa- gation scenarios. In particular, the fifth chapter presents the theoretical analysis to evaluate the number of simultaneous communications that can be sustained by a distributed wireless network using adaptive antennas in presence of multipath. The sixth chapter extends this model to switched-beam antennas, while address- ing the mobility aspects and discussing the cost-benefit tradeoff that is related to the use of multiple antenna techniques in today’s wireless networks. A detailed throughput-delay analysis is performed in the seventh chapter, where the impact of advanced antenna systems on 802.11-based networks is investigated using a Markov chain model. The influence of the antenna array geometry is examined in the eighth chapter adopting a numerical approach based on a discrete-time simula- tor, which is able to take into account the details of the channel and of the antenna system behavior. The third part describes the original results obtained in the field of antenna array pattern synthesis. The ninth chapter presents the technique developed to modify the excitation phases of an antenna array in order to reject interferers spread over an angular region according to a given spatial statistic. The tenth chapter describes the iterative algorithm for phased arrays, which is able to produce low side-lobe level patterns with multiple prescribed main lobes and nulls. Finally, the eleventh chapter summarizes the thesis contributions and remarks the most important con- clusions.

The intent of the work presented hereafter is to examine the benefits that derive from the employment of smart antenna techniques from a realistic perspective, as well as to provide some useful solutions to improve the reliability of the commu- nications and to increase the network capacity. List of acronyms

AA Adaptive Antenna. ADC Analog-to-Digital Converter. ACK ACKnowledgement. AP Access Point. BER Bit Error Rate. BPSK Binary Phase Shift Keying. BSS Basic Service Set. CDMA Code Division Multiple Access. CFP Contention Free Period. CLA Cantor Linear Array. CMA Constant Modulus Algorithm. CP Contention Period. CPU Central Processing Unit. CRA Concentric Ring Array. CS Carrier Sensing. CSE Cumulative Square Error. CSMA Carrier Sensing Multiple Access. CTS Clear To Send. CW Contention Window. DA Directional Antenna. DC DownConversion. DCTS Directional CTS. DCF Distributed Coordination Function. DD Directional DATA. DFT Discrete Fourier Transform. DIFS Distributed InterFrame Space. DNAV Directional NAV. DOA . DS Distribution System. DSP Digital Signal Processor. DSSS Direct Sequence .

vii viii List of acronyms

DWN Distributed Wireless Network. ECB Efficient Coding Bound. E-SPC Extended-SPC. ESPRIT Estimation of Signal Parameters via Rotational Invariance Techniques. ESS Extended Service Set. FDMA Frequency Division Multiple Access. FHSS Frequency Hopping Spread Spectrum. FIR Finite Impulse Response. FNBW First Null BeamWidth. FPGA Field Programmable Gate Array. GBSBM Geometrically Based Single Bounce Macrocell. HPBW Half Power BeamWidth. IBSS Independent Basic Service Set. ICI InterCarrier Interference. IF Intermediate Frequency. IR InfraRed. ISI InterSymbol Interference. ISM Industrial, Scientific and Medical. LMS Least Mean Square. LOS Line Of Sight. MAC Medium Access Control. MANET Mobile Ad-hoc NETwork. MIMO Multiple Input Multiple Output. MRC Maximal Ratio Combining. MSE Mean Square Error. MUSIC MUltiple SIgnal Classification. MVDR Minimum Variance Distortionless Response. NAV Network Allocation Vector. OCTS Omnidirectional CTS. OFDM Orthogonal Frequency Division Multiplexing. PAS Power Azimuth Spectrum. PC Point Coordinator. PCF Point Coordination Function. PCMCIA Personal Computer Memory Card International Association. PDA Personal Digital Assistant. PDP Power Delay Profile. PER Packet Error Rate. pdf probability density function. PHY PHYsical (layer). QAM Quadrature Amplitude Modulation. QPSK Quadrature Phase Shift Keying. List of acronyms ix

RCB Random Coding Bound. RF . RTS Request To Send. SBA Switched-Beam Antenna. SCM Single Coordinate Method. SCSMA/CN Selective CSMA with Cooperative Nulling. SD Smart DATA. SDMA Space Division Multiple Access. SIFS Short InterFrame Space. SINR Signal to Interference plus Noise Ratio. SLL Side-Lobe Level. SNR Signal to Noise Ratio. SPC Single Parity Check. SQP Sequential Quadratic Programming. STC Space-Time Coding. TDMA Time Division Multiple Access. TEM Transverse ElectroMagnetic. UCA Uniform Circular Array. ULA Uniform Linear Array. URA Uniform Rectangular Array. Wi-Fi Wireless Fidelity. WiMAX Worldwide interoperability for Microwave Access. WLAN Wireless Local Area Network. WMN Wireless Mesh Network.

Contents

Summary iii

List of acronyms vii

List of symbols 1

I Background 7

1 Fundamentals of Antenna Arrays 9 1.1 Maxwell’s equations ...... 9 1.2 Antenna fundamentals ...... 10 1.2.1 Poynting vector ...... 10 1.2.2 Antenna regions ...... 11 1.2.3 Radiation properties ...... 12 1.3 Antenna arrays ...... 14 1.3.1 Linear arrays ...... 16 1.3.2 Rectangular arrays ...... 18 1.3.3 Circular arrays ...... 19 1.3.4 Conformal arrays ...... 20

2 Propagation Channel Modeling 21 2.1 The wireless channel ...... 21 2.1.1 Path-loss attenuation ...... 21 2.1.2 Fading ...... 22 2.1.2.1 Rayleigh fading ...... 23 2.1.2.2 Rician fading ...... 25 2.1.2.3 Nakagami fading ...... 26 2.1.3 Shadowing ...... 27 2.2 Spatial channel models ...... 27 2.2.1 Low-rank environment ...... 29

xi xii Contents

2.2.1.1 Uniform distribution ...... 30 2.2.1.2 Truncated cosine ...... 31 2.2.1.3 Truncated Gaussian ...... 32 2.2.1.4 Ring of scatterers ...... 33 2.2.1.5 Disk of scatterers ...... 35 2.2.1.6 Truncated Laplacian ...... 36

3 Multiple Antenna Systems 37 3.1 Benefits of multi-antenna systems ...... 37 3.2 Classification ...... 38 3.3 MIMO-spatial multiplexing ...... 39 3.4 Spatial diversity ...... 41 3.5 Beamforming in low-rank environment ...... 42 3.6 Fixed beamforming ...... 44 3.6.1 Switched-beam antennas ...... 44 3.6.2 Delay and sum beamforming ...... 45 3.6.3 Beam-space beamforming ...... 45 3.7 Adaptive beamforming ...... 46 3.7.1 Spatial reference techniques ...... 48 3.7.1.1 DOA estimation algorithms ...... 49 3.7.2 Temporal reference techniques ...... 51 3.7.2.1 Unconstrained LMS algorithm ...... 52 3.7.2.2 RLS algorithm ...... 53 3.7.3 Blind techniques ...... 54

4 Distributed Wireless Networks 57 4.1 General concepts ...... 57 4.2 IEEE 802.11 ...... 59 4.2.1 Transmission rates ...... 60 4.2.2 Architecture ...... 60 4.2.3 The 802.11 DCF ...... 61 4.2.3.1 Basic access ...... 61 4.2.3.2 RTS/CTS access ...... 62 4.3 DWNs and advanced antenna techniques ...... 63 4.3.1 MAC layer problems ...... 64 4.3.1.1 Hidden terminal due to unheard RTS/CTS . . . 65 4.3.1.2 Hidden terminal due to asymmetry of gain . . . 66 4.3.1.3 Exposed terminal ...... 67 4.3.1.4 Deafness ...... 67 4.3.1.5 Muteness ...... 68 4.3.1.6 Suicide ACK ...... 69 Contents xiii

4.3.2 MAC layer proposals ...... 70 4.3.2.1 Directional NAV ...... 71 4.3.2.2 Synchronous communications ...... 71 4.3.2.3 Tones ...... 72 4.3.2.4 Multiple RTS packets ...... 73 4.3.2.5 Longer handshake ...... 74 4.3.3 Theoretical approaches ...... 74

Original Results 79

II Advanced Antenna Systems for Distributed Wireless Net- works in Low-Rank Environment 79

5 Simultaneous Communications in DWNs Using Adaptive Antenna Ar- rays 81 5.1 Introduction ...... 81 5.2 Definitions and assumptions ...... 82 5.2.1 MAC layer assumptions ...... 83 5.2.2 PHY layer assumptions ...... 83 5.3 Multipath model and equivalent gains ...... 84 5.4 Interference model ...... 87 5.5 Sustainable links ...... 89 5.5.1 High number of sustainable links ...... 89 5.5.2 Low number of sustainable links ...... 92 5.6 Topology and access scheme ...... 92 5.6.1 Uniform distribution ...... 92 5.6.1.1 Omnidirectional CTS (OCTS) ...... 93 5.6.1.2 Directional CTS (DCTS) ...... 94 5.6.2 Random distribution ...... 95 5.6.3 Refinement for Smart DATA transmission ...... 96 5.7 Results ...... 97 5.7.1 Packet transmission policy ...... 98 5.7.2 Angular spread and topology ...... 100 5.7.3 Path loss and spatial channel model ...... 102 5.8 Model validation ...... 104 5.9 Summary ...... 106 xiv Contents

6 Multi-Antenna and Channel Coding Techniques for Wireless Mesh Routers 109 6.1 Introduction ...... 109 6.2 Sustainable links of SBAs in WMNs ...... 110 6.3 Mobility effects ...... 113 6.3.1 Modification of the topology ...... 113 6.3.2 Fading ...... 114 6.4 Results in not mobile environment ...... 115 6.5 Model application: multiple antennas and channel coding . . . . . 118 6.5.1 Coding techniques ...... 118 6.5.1.1 Convolutional codes ...... 118 6.5.1.2 Efficient codes ...... 118 6.5.1.3 Extended-Single Parity-Check codes ...... 119 6.5.2 Performance figure and design parameters ...... 119 6.5.3 Results ...... 121 6.5.3.1 Not mobile environment ...... 121 6.5.3.2 Mobile environment ...... 127 6.6 Considerations ...... 130

7 Throughput-Delay Analysis of 802.11 DWNs Using Beamforming Tech- niques 133 7.1 Introduction ...... 133 7.2 Markov chain model ...... 134 7.3 Throughput-delay analysis ...... 138 7.4 Results ...... 141 7.4.1 Parameter settings ...... 142 7.4.2 Optimum contention window ...... 143 7.4.3 Non saturated behavior ...... 146 7.4.4 Number of nodes ...... 148 7.5 Summary ...... 149

8 On the Influence of Array Geometry in DWNs Employing Smart An- tennas 151 8.1 Introduction and array geometry description ...... 151 8.2 Signal and channel model ...... 154 8.3 Adopted MAC protocol ...... 156 8.4 Simulation platform ...... 157 8.4.1 Adopted parameters ...... 159 8.5 Results ...... 160 8.5.1 Access scheme ...... 160 8.5.2 Array geometry ...... 162 Contents xv

8.5.3 Training sequence ...... 164 8.5.4 Multipath fading ...... 165 8.6 Summary ...... 166

III Antenna Array Synthesis Techniques 169

9 Exploitation of Spatial Channel Model for Antenna Array Synthesis 171 9.1 Introduction ...... 171 9.2 Problem formulation ...... 172 9.3 Projection operators ...... 173 9.4 Exploitation of the spatial channel model ...... 174 9.5 Numerical results ...... 177 9.6 Considerations and summary ...... 179

10 Multi-Beam and Null Synthesis of Antenna Arrays by Phase-Only Control 181 10.1 Introduction and problem formulation ...... 181 10.2 Synthesis technique ...... 182 10.3 Numerical results ...... 185 10.4 Setting of the weights ...... 190

11 Conclusions 191

Appendix. Smart DATA transmission cases 193

Bibliography 197

List of publications 215

List of symbols1

a(ϕ) Antenna array steering vector in the azimuth plane. AF (ϑ, ϕ) Antenna array factor. Brx Receiver filter bandwidth. bpl Number of bits of the payload. bts Number of bits of the training sequence. Cr Coding rate. 0 CWi0 Contention window at i -th transmission attempt. CWmin Minimum contention window. CWopt Optimum contention window. D Destination node. det(·) Matrix determinant. E{·} Expectation. E(w, ϕ) Antenna system field pattern in the azimuth plane. Ek(ϕ) Field pattern of the k-th antenna element in the azimuth plane. Es(r) Electric complex field. FD(ϕ) Equivalent power gain pattern in the azimuth plane. FT(r, ϕ) Topology function. f d Doppler spread. G(ϕ) Antenna system power gain pattern in the azimuth plane. Gd Average equivalent power gain in the desired direction. Gm Average equivalent power gain in [0, 2π]. 0 Gm Average equivalent power gain outside the FNBW. 00 Gm Average equivalent power gain outside the HPBW. Gn Average equivalent power gain in a null.

Gtx1 Transmitting equivalent power gain of the interferers in the region R1.

Gtx2 Transmitting equivalent power gain of the interferers in the region R2. g Weight vector for the terms of the cost function i(w). gl Weight for the l-th term of the cost function i(w). Hs(r) Magnetic complex field. I Generic interferer.

1This list contains the symbols that recur along the thesis and whose explanation is not re- peated in each section where they are mentioned. Mathematical quantities without direct physical meaning and defined only for calculation purposes are not reported.

1 2 List of symbols

IN Identity matrix with rank N. j Imaginary unit. Lc Area covered by the communication range of a node. Lt Area covered by the entire network. Lmax Number of sustainable links. Number of array pattern nulls that are necessary to suppress the l-th M l spread interferer. m Retry Limit of the 802.11 DCF. m0 Maximum backoff stage of the 802.11 DCF. mN Nakagami parameter. N Number of antennas. NCRA Number of antennas of a CRA. Nhop Average number of hops between source and destination. Nrx Number of receiving antennas of a MIMO system. Ntx Number of transmitting antennas of a MIMO system. NUCA Number of antennas of a UCA. NULA Number of antennas of a ULA. NURA Number of antennas of a URA. n Number of nodes in the entire network. n2 Number of nodes in the region R2. ndes Number of desired sources. nint Number of interferers. ntx Number of transmitting sources. Pdes Received desired signal power. Pint Received interference power.

Pint1 Interference power received from region R1.

Pint2 Interference power received from region R2.

Pint3 Interference power received from region R3. Prx Total received power. P¯rx Average power at the input of the receiving antenna system. Ptx Transmitted power. Pϕ(ϕ) Power Azimuth Spectrum. pc Conditional collision probability. poutage Outage probability. ptx Transmission probability of a single node. Q Number of multipath components corresponding to a generic source. R Bit rate for the DATA packet. R1 Region of insuppressible interference. R2 Region of suppressible interference. R3 Region of no interference. Rc Communication range of a node. Rc Bit rate for the control packets. RH(ϕ) Radius bounding regions R1 and R2. List of symbols 3

RL(ϕ) Radius bounding regions R2 and R3. Rsd Average source-destination distance. Rss Correlation matrix corresponding to the desired part of x(t). Rt Radius of the area occupied by the entire network. Ruu Correlation matrix corresponding to the undesired part of x(t). Rxx Array correlation matrix. r Position vector. rk Radial coordinate of the k-th array element. rank(·) Matrix rank. S Source node. Sag Normalized aggregate throughput. Sinput Net offered traffic load. Smax Sustainable throughput. SINRth SINR threshold in not mobile environment. SINRout SINR at the antenna system output. sgn(·) Sign function. T Successful packet delay. TACK Time required to transmit an ACK packet. TCTS Time required to transmit a CTS packet. TDATA Time required to transmit a DATA packet. TRTS Time required to transmit an RTS packet. Tcol Time wasted because of collision. Ts Transmitted symbol duration. Tsucc Time required by a successful transmission. t Time variable. tr(·) Matrix trace. ~v Vector speed of a mobile node. vc Speed of light in the free space. W Noise power. w Vector of antenna array excitations. w(i) Vector of antenna array excitations at time instant i. wk Current excitation of the k-th array element. wk(i) Current excitation of the k-th array element at time instant i. x(i) Antenna input signal vector at time instant i. x(t) Antenna input signal vector at time t. xk(t) Input signal at the k-th antenna array element at time t. xs(i) Desired part of x(i) at time instant i. xu(i) Undesired part of x(i) at time instant i. α Path-loss exponent. γG Normalization constant for the truncated Gaussian pdf. γL Normalization constant for the truncated Laplacian pdf. γLMS Step size for the LMS algorithm.

γm1 Maximum angular spread for the ring of scatterers pdf. 4 List of symbols

γm2 Maximum angular spread for the disk of scatterers pdf. γα Term accounting for the antenna height in the path-loss model. K δi0m Kronecker delta. ε Permittivity of the medium. ϑ Zenith angle. Λ Mean value of a Poisson packet arrival process. Λ1 Probability of packet arrival during the processing of a previous packet. Λ2 Probability of packet arrival in the idle state. λ Wavelength. µ Permeability of the medium. Average number of slots required for processing a packet in the 802.11 ² num_slots DCF. Average time between two consecutive backoff time counter decrements ² slot in the 802.11 DCF. Average number of slots required for a successful packet transmission ² succ_slots in the 802.11 DCF. ξk Angular position of the k-th element of a UCA. ρc Radius of a UCA. ρl Interelement spacing of a ULA. %˜act(r, ϕ) Active node density. %DOA(ϕ) Pdf of the DOAs. l %DOA(ϕ) Pdf of the DOAs corresponding to the l-th interferer. %FAD(z) Pdf of the envelope of the received signal. %˜FAD(z) Pdf of the squared envelope of the received signal. %SOU(r, ϕ) Pdf of the sources around the destination. %TOP(r, ϕ) Pdf of the interferers around the destination. % (r) Marginal of the pdf % (r, ϕ) with respect to r. (·)r (·) % (ϕ) Marginal of the pdf % (r, ϕ) with respect to ϕ. (·)ϕ (·) σslot Slot time. σˆϕ Azimuth spread of the channel. Azimuth spread of the channel between the l-th source and the destina- σˆ ϕl tion. σˆτ Delay spread of the channel. ς Angle between source-destination LOS and relative vector speed ~v. Φ Vector of array excitation phases. φk Excitation phase of the k-th array element. ϕ Azimuth angle. ϕ0 Mean DOA. ϕ3dB HPBW in the azimuth plane. ϕFN FNBW in the azimuth plane. ϕd Desired azimuth direction. d ϕl Desired azimuth direction corresponding to the l-th source. ϕk Azimuth coordinate of the k-th array element. List of symbols 5

ϕlq DOA of the q-th signal replica corresponding to l-th source. ϕn Undesired azimuth direction. n ϕl Undesired azimuth direction corresponding to the l-th source. Ψcol Collision probability. Ψdrop Drop probability. 0 ψi0,i Stationary probability of being in the state (i , i). Ψsucc Probability of successful transmission. Stochastic process representing the backoff stage of the 802.11 DCF at ψ (t) s time t. Ψtx Transmission probability. Stochastic process representing the backoff timer of the 802.11 DCF at ψ (t) t time t. i(w) Cost function. .w) Mean square norm)ג b·c Floor function. d·e Ceiling function. (·)∗ Complex conjugate. (·)† Matrix pseudoinverse. (·)H Complex conjugate transpose of a vector or matrix. (·)T Transpose of a vector or matrix.

Part I

Background

Chapter 1

Fundamentals of Antenna Arrays

This chapter briefly summarizes the basic principles of antennas, explaining the mechanism of wireless electromagnetic propagation. Some fundamental defini- tions of antenna theory are recalled from the literature and an introduction to antenna arrays is provided together with a description of the most common array geometries.

1.1 Maxwell’s equations

Wireless communications are based upon the transmission and reception of elec- tromagnetic signals from antennas. The physics laws that describe the propagation of an electromagnetic wave are summarized by the Maxwell’s equations, which can be expressed for an isotropic and homogeneous medium as [1]:

ρvol(r, t) ∇ • E(r, t) = , (1.1a) ε ∇ • H(r, t) = 0, (1.1b) ∂H(r, t) ∇ × E(r, t) = −µ , (1.1c) ∂t ∂E(r, t) ∇ × H(r, t) = ε + J(r, t), (1.1d) ∂t where r denotes the spatial position vector, t is the time variable, E(r, t) is the electric field intensity vector, µ is the permeability of the medium, H(r, t) is the magnetic field intensity vector, ε is the permittivity of the medium, J(r, t) is the current density vector and ρvol(r, t) is the volume charge density. According to the mathematical meaning of the divergence operator, which mea- sures the magnitude of a vector field’s source or sink and can be viewed as a flux

9 10 Chapter 1. Fundamentals of Antenna Arrays density, and to the meaning of the curl operator, which shows the vector field’s rate of rotation (the direction of the axis of rotation and the magnitude of the rotation), the four Maxwell’s equations describe the principles of electrodynam- ics. The first equation (Gauss’s law) states that the presence of static or dynamic charges in a given volume determines a diverging electric field, while the second one (Gauss’s law for magnetism) means that there is nothing available in nature which makes a magnetic field diverge. The third equation (Faraday’s law) states that a non-stationary magnetic field causes a curl in the electric field and, finally, the last equation (Ampere’s law) means that a non-stationary electric field and/or a current through a medium capable of carrying a flow of electric charges deter- mines a curl in the magnetic field. The Faraday’s and the Ampere’s laws are fundamental to obtain a wave propagat- ing in a wireless environment, where no charge and current densities are present. In this case, a stationary current density J(r) is useless, being unable to generate a space-time varying electromagnetic field. Instead, a time-varying current density J(r, t) generates a space-time varying magnetic field H(r, t), which, in turn, gen- erates a space-time varying electric field E(r, t). At this point, the electric field can produce a space-time varying magnetic field even in the absence of a current density, and so the magnetic and the electric fields are able to sustain each other.

1.2 Antenna fundamentals

An antenna is a device capable of carrying the time-varying current density that is necessary to generate the electromagnetic wave. The IEEE Standard Definitions of Terms for Antennas, [2], defines an antenna as “that part of a transmitting or receiving system that is designed to radiate or to receive electromagnetic waves”. The antenna represents a transitional structure between free-space and a guiding device, where the guiding device is a transmission line that transports the elec- tromagnetic energy from the transmitter to the antenna or from the antenna to the receiver [3].

1.2.1 Poynting vector Assuming harmonic variations, the instantaneous radiated fields E(r, t) and H(r, t) can be expressed in terms of the complex fields Es(r) and Hs(r) as: jωt E(r, t) = Re{Es(r)e }, (1.2a) jωt H(r, t) = Re{Hs(r)e }, (1.2b) √ where j = −1 is the imaginary unit and ω is the angular frequency. The com- ponents of the complex fields produced by an antenna are directly related to the 1.2. Antenna fundamentals 11

Figure 1.1: Antenna field regions. physical properties of the antenna itself and can be derived solving the Maxwell’s equations by proper mathematical and numerical techniques. The quantity used to describe the power associated to an electromagnetic field is the Poynting vector, which is defined in the sinusoidal case as: −→ 1 W(r) , E (r) × H∗(r), (1.3) 2 s s −→ where (·)∗ denotes the complex conjugate. The real part of W(r) represents the active power density of the field generated by the antenna, while the imaginary −→ part of W(r) represents the reactive power density associated to this field. There- fore, the average power radiated over a closed surface M surrounding the antenna can be evaluated as: ZZ ZZ −→ 1 ∗ P = ° W(r) • ds = ° Re{E (r) × H (r)} • ds. (1.4) rad 2 s s M M

1.2.2 Antenna regions The generated electromagnetic field and the radiation properties of an antenna are related to its physical size and to the operating wavelength. The space sur- rounding an antenna is usually subdivided into three regions, which are defined by proper boundaries (Fig. 1.1). The first region, called the reactive near-field region, isp bounded by the antenna surface and by the spherical surface having ra- 3 dius 0.62 Dmax/λ, where Dmax is the largest dimension of the antenna and λ 12 Chapter 1. Fundamentals of Antenna Arrays is the wavelength. This region contains the reactive energy stored in the vicinity of the antenna, while the active radiated power is negligible. The second region, called the radiating near-fieldpor Fresnel region, is defined by the intersection of 3 2 the spheres having radii 0.62 Dmax/λ and 2Dmax/λ. In this region the radi- ation of active power prevails, but the angular field distribution depends on the distance from the antenna. The far-field or Fraunhofer region lies outside the 2 sphere having radius 2Dmax/λ and represents the principal region of operation for . In the Fraunhofer region the imaginary part of the Poynting vector approaches zero much faster than its real part and so the reactive power is negligible. Besides, the electric and magnetic field components are perpendicular to each other and transverse to the radial direction of propagation ˆr. Therefore, in the Fraunhofer region, Es(r) and Hs(r) form a Transverse ElectroMagnetic (TEM) wave:

Es(r) = η0Hs(r) × ˆr, (1.5a) 1 Hs(r) = ˆr × Es(r), (1.5b) η0 p ∼ where η0 = µ/ε = 377 Ω is the intrinsic impedance of the free space.

1.2.3 Radiation properties

The radiation intensity Wu(ϑ, ϕ) is a far-field parameter that represents the radi- ated power per unit solid angle in a given direction defined by the zenith angle ϑ and the azimuth angle ϕ. This parameter can be evaluated multiplying the com- ponent of the Poynting vector in the direction of propagation by r2:

2 −→ Wu(ϑ, ϕ) = r Re{W(r) • ˆr}, (1.6) and is used to define the antenna power gain, which represents the ratio between the radiation intensity and the power at the input of the antenna, Pinput, divided by 4π: 4πW (ϑ, ϕ) G(ϑ, ϕ) , u . (1.7) Pinput The antenna power gain is also given by the product between the antenna radiation efficiency ecd and the D(ϑ, ϕ). In particular, the radiation efficiency accounts for the conduction and the dielectric losses, and is defined as the ratio of the radiated power to the input power:

Prad Prad ecd , = , (1.8) Pinput Prad + Ploss 1.2. Antenna fundamentals 13

Figure 1.2: Example of .

where Ploss is the antenna power loss. Besides, the directivity is the ratio between the radiation intensity and the radiated power divided by 4π: 4πW (ϑ, ϕ) D(ϑ, ϕ) , u . (1.9) Prad The radiation properties of an antenna as a function of the space coordinates are described by mathematical functions called radiation patterns. These functions can be adopted to represent several antenna parameters, such as radiation intensity, field strength, directivity and power gain. With reference to the example shown in Fig. 1.2, the following characterizing elements can be defined in a radiation pattern. • Null: direction in which the pattern assumes very small values, ideally zero. • Lobe: any angular region bounded by two nulls. • : lobe that contains the direction of maximum radiation. • Minor lobe: any lobe except the main one. If the pattern assumes the max- imum radiation value in unwanted directions external to the main lobe, the lobes containing these directions are called grating lobes. 14 Chapter 1. Fundamentals of Antenna Arrays

: a minor lobe that is usually adjacent to the main lobe and occu- pies the same hemisphere in the direction of maximum gain.

• Half Power BeamWidth (HPBW) or 3 dB BeamWidth: angular region con- taining the direction of maximum radiation that lies between the two direc- tions in which the radiation is one-half of this maximum. In the figure ϕ3dB denotes the HPBW in the azimuth plane.

• First Null BeamWidth (FNBW): entire angle spanned by the main lobe. The FNBW can be associated to the ability of an antenna to reject interference. In the figure ϕFN represents the FNBW in the azimuth plane.

• Side-Lobe Level (SLL): maximum relative radiation of the highest side lobe with respect to the maximum radiation of the main lobe.

1.3 Antenna arrays

Usually the beamwidth of a single antenna element pattern is too wide for many wireless terrestrial and space applications, which, in many cases, require high gains towards certain directions [4]. Besides, a narrower HPBW (or FNBW) can be necessary for spatial filtering operations and to increase the gain in the desired directions as well as to reduce it in the undesired ones. Directional patterns can be obtained by increasing the single antenna element size or by using more radiating elements in order to form an array. In this second case the individual antennas are arranged according to a proper geometrical configuration and the current ex- citations of each element are synthesized to provide the desired radiation pattern. For practical purposes all radiators belonging to an array are usually chosen as identical, even if, for specific applications, antenna arrays consisting of different elements can be built. By adopting multi-antenna structures, it is possible to gen- erate radiation patterns with multiple main beams, each with a desired beamwidth, while satisfying side-lobe level and null constraints. The synthesis process can be performed by properly selecting the number of array elements, their geometrical configuration and the interelement spacing. Besides, the radiation pattern can be electronically controlled by modifying the phase and/or the amplitude of the cur- rent excitations. The total field radiated by an antenna array is determined by the vector addition of the individual elements. The far-field radiation properties of an antenna array can be mathematically summarized by the array steering vector:

2πvc 2πvc j τ1(ϑ,ϕ) j τN (ϑ,ϕ) T a(ϑ, ϕ) , [E1(ϑ, ϕ)e λ , ..., EN (ϑ, ϕ)e λ ] , (1.10) 1.3. Antenna arrays 15

p T where (·) denotes the transpose of a vector or matrix, Ek(ϑ, ϕ) = Gk(ϑ, ϕ) is the k-th single element field (or amplitude) pattern, vc is the speed of light in free space and τk(ϑ, ϕ) represents the delay of a plane wave arriving from direction (ϑ, ϕ) and measured from the k-th element of the array with respect to the origin. The array steering vector includes both the radiation properties of each element and the geometrical characteristics of the antenna array. These characteristics determine the delay, which can be evaluated as:

i rk • ˆr τk(ϑ, ϕ) = , (1.11) vc

T where rk = (rk sin ϑk cos ϕk, rk sin ϑk sin ϕk, rk cos ϑk) is the position of the k-th array element in spherical coordinates, and:

ˆri = (sin ϑ cos ϕ, sin ϑ sin ϕ, cos ϑ)T , (1.12) is the unit vector of the incoming wave. According to the principle of pattern multiplication, if the individual elements are identical, the pattern produced by an array can be expressed as the product between the pattern of the single element with respect to a given reference point and the array factor:

N X 2πvc j τk(ϑ,ϕ) AF (ϑ, ϕ) , wke λ , (1.13) k=1 where wk is the complex excitation of the k-th array element. The characteristics of AF (ϑ, ϕ) can be controlled by varying the excitations, the number of elements, the interelement spacing and the geometrical configuration of the array. When two antenna array elements are sufficiently close, the electromagnetic field radiated by one element couples into the other and vice versa. This phenomenon is called mutual coupling and depends on the interelement spacing, the radiation characteristics and the orientation of the single element. This interchange of en- ergy complicates the array design, because mutual coupling is difficult to predict by analytical methods, but, in many scenarios, it must be taken into account be- cause of its significant contribution [3]. In fact, mutual coupling leads to a distor- tion of the single element radiation pattern, which influences the resulting pattern of the entire antenna array and may lead to unprecise steering of the main lobe and the nulls. An interelement distance larger than or equal to half the wavelength is commonly considered sufficient to neglect mutual coupling effects, while, for lower distances, the distorted element patterns can be evaluated with numerical techniques. 16 Chapter 1. Fundamentals of Antenna Arrays

Figure 1.3: Uniform linear array.

1.3.1 Linear arrays Usually, in the design of an antenna array, some constraints, such as the SLL, the FNBW, the HPBW and the directivity, are specified, while others, such as the phase/amplitude of the elements, the number of radiators and the geometry of the array, must be properly derived to satisfy the design requirements. The most common and most analyzed geometry is the linear antenna array, which consists of N antenna elements displaced on a straight line. If the adjacent ele- ments are equally spaced (Fig. 1.3), the array is referred to as a Uniform Linear Array (ULA). If, in addition, all excitations have identical amplitudes (|w1| = |w1| = ... = |wN |) and the phase of the k-th element is increased by a constant progressive phase ι with respect to the (k − 1)-th element, the array is referred to as a uniform array. In this particular case, the normalized array factor in the azimuth plane can be expressed as: " Ã !# N 2πρl sin cos ϕ + ι ³ π ´ 1 2 λ AFnorm ϑ = , ϕ = " Ã !# , (1.14) 2 N 1 2πρl sin cos ϕ + ι 2 λ where ρl is the interelement spacing. The main lobe can be steered towards the desired direction by properly modifying the progressive phase shift, while a nar- 1.3. Antenna arrays 17

0

−10

−20

−30

−40 dB

−50

−60

−70

−80 0 45 90 135 180 ϕ(o)

Figure 1.4: of a ULA for N = 5 and ρl = 0.5λ. Uniform array Binomial array Dolph-Tschebyscheff array

row HPBW can be obtained by increasing N. A limitation of uniform arrays is due to the fact that, independently of the number of elements, the ratio between the maximum of the main lobe and the maximum of the first side lobe is approximately equal to 13.5 dB. This level may be not suit- able for certain applications, where more stringent constraints must be imposed on the level of the secondary lobes. In fact, to reduce the transmitted/received power outside the main lobe, the minor lobes should be as low as possible. In general, the problem of low SLL array design is substantially equivalent to the problem of designing Finite Impulse Response (FIR) digital filters in a Digital Signal Proces- sor (DSP). Therefore, a large number of techniques have been taken from digital to produce patterns with low side lobes. These techniques per- form the weighting of the array elements by adopting proper functions, such as Gaussian, Kaiser-Bessel and Blackman windows [5]. Widely adopted synthesis techniques for ULAs are the Dolph-Tschebyscheff and the binomial methods, which consider a nonuniform distribution of the excita- tion amplitudes. Comparing the characteristics of uniform, Tschebyscheff and binomial arrays, it can be observed that the uniform arrays provide the smallest HPBW and the highest SLL, while the binomial arrays yield the largest HPBW and the lowest SLL (Fig. 1.4). In particular, a binomial array with interelement 18 Chapter 1. Fundamentals of Antenna Arrays

Figure 1.5: Uniform rectangular array.

spacing lower than or equal to λ/2 has no side lobes. The HPBW and the SLL of a Tschebyscheff array lie between those of binomial and uniform arrays. Besides, for a given SLL, the Dolph-Tschebyscheff arrays provide the smallest FNBW and, reciprocally, for a given FNBW, the Dolph-Tschebyscheff arrays provide the low- est possible SLL [3]. Even if ULAs are widely applied, there are scenarios in which the linear geometry is not appropriate. Other configurations must be adopted to satisfy some partic- ular encumbrance requirements on buildings or vehicles and to provide higher performance in terms of beam scanning.

1.3.2 Rectangular arrays Rectangular arrays are more versatile with respect to linear arrays and can be em- ployed to obtain patterns with a lower SLL. Similarly to ULAs, proper weighting methods can be considered to further reduce the side-lobe level and the beamwidth. Besides, a rectangular configuration has the capability to perform the beam scan- ning in both the azimuth and the elevation planes. As shown in Fig. 1.5, a rectangular array is obtained when the individual radi- ating elements are positioned along a rectangular grid. If the adjacent elements are equally spaced the array is called a Uniform Rectangular Array (URA). This configuration finds application in a wide range of systems, such as remote sens- 1.3. Antenna arrays 19

ing, tracking and search . An Nx · Ny URA can also be viewed as Ny linear y arrays placed at distance ρr , where each array is formed by Nx elements with x interelement spacing ρr . Therefore, for a progressive phase URA with uniform amplitudes, the normalized array factor can be expressed as:  " Ã !# x  Nx 2πρr   sin sin ϑ cos ϕ + ιx   1 2 λ  AFnorm(ϑ, ϕ) = " Ã !# · Nx 1 2πρx   sin r sin ϑ cos ϕ + ι   2 λ x   " Ã !# (1.15) y  Ny 2πρr   sin sin ϑ sin ϕ + ιy   1 2 λ  · " Ã !# , Ny 1 2πρy   sin r sin ϑ sin ϕ + ι   2 λ y  where ιx and ιy are the progressive phase shifts along the x and the y axis, re- spectively. When the interelement spacing is larger than or equal to half the wave- length, grating lobes can appear in the radiation pattern because of the in-phase addition of the radiated fields towards directions different from that scanned by the main lobe.

1.3.3 Circular arrays Another commonly employed configuration is the Uniform Circular Array (UCA), in which the elements are regularly arranged on a circular ring (Fig. 1.6). The UCA is of very practical interest and is often adopted in radar and systems as well as in cellular base stations. Considering a UCA of radius ρc, the normal- ized array factor can be expressed as:

N X 2π j ρc sin ϑ cos(ϕ−ξk) AF (ϑ, ϕ) = wke λ , (1.16) k=1 where ξk is the angular position of the k-th element. Thanks to its high degree of symmetry the UCA is able to provide an identical HPBW towards all azimuth directions. Besides, a direct comparison between a UCA and a ULA shows that, adopting the same number of elements and the same spacing between adjacent radiators, the circular array produces narrower main beams with respect to the corresponding linear array. The performance of the circular configurations can be improved by using multiple rings in order to obtain a Concentric Ring Array (CRA). This planar geometry enables the scanning in both azimuth and elevation planes [6–7]. 20 Chapter 1. Fundamentals of Antenna Arrays

Figure 1.6: Uniform circular array.

1.3.4 Conformal arrays ULAs, URAs and UCAs are widely adopted geometries, based upon a regular and symmetrical design. These configurations are suitable for applications in which the mounting support is able to sustain the structure and particular size or shape constraints are not present. However, in many practical scenarios, such as space- craft, aircraft or missile applications, the mounting surface is irregular and/or the available space is limited. In these situations the array geometry must be designed to match the particular requirements of the support and so a conformal array is needed. The antenna elements can be disposed on an ellipse, on an arc, or can be placed according to more complex three-dimensional topologies, usually cir- cularly symmetric surfaces, such as cylinders, cones or spheres [8]. In general, the patterns of the elements can be oriented towards different directions, because of the irregularity of the geometry, and so the single element pattern cannot be factored out from the total array pattern. [9]. Proper antenna elements may be required for conformal arrays, because the generic radiator may have to adhere to aerodynamic profiles. Besides, particular single el- ement radiation patterns may be necessary to satisfy the design specifications for dedicated array topologies [10]. Chapter 2

Propagation Channel Modeling

This paper introduces the main characteristics of the wireless propagation envi- ronment and provides some basic definitions. To provide realistic models for eval- uating the performance of advanced antenna array systems, particular attention is dedicated to the spatial properties of the wireless communication channel. The most important statistical distributions for the Power Azimuth Spectrum (PAS) are presented together with the classical fading models.

2.1 The wireless channel

Free-space propagation occurs when a unique direct signal path exists between a transmitter and a receiver. However, this model oversimplifies the real behavior of the wireless channel, in which obstacles and scatterers characterize the surround- ing environment of two communicating nodes. Reflections, refractions, diffrac- tions and scattering determine the presence of many signal replicas at the receiver, leading to a phenomenon referred to as multipath. Besides, the complexity of the scenario is increased by the effects due to mobility, which cause short-term fluc- tuations (fading) and long-term fluctuations (shadowing) of the received signal envelope. Therefore, taking into account these characteristics, the signal attenua- tion in a wireless propagation channel is usually schematized as the combination of three main factors: path-loss, fading and shadowing.

2.1.1 Path-loss attenuation Path-loss attenuation is the power density reduction of an electromagnetic wave propagating through space and is mainly due to the distance between the transmit- ter and the receiver. However, additional environmental elements, due to location

21 22 Chapter 2. Propagation Channel Modeling of antennas, terrain contours, vegetation, foliage and dry, may increase the losses. The path-loss attenuation can be described by a parameterized ground model, in which the power received by a node at distance r from a transmitter is evaluated as [11]: P γ G G P = tx α tx rx , (2.1) rx rα where Ptx is the transmission power, α(> 2) is the path-loss exponent, γα ac- counts for the height of the transmitting and the receiving antennas with respect to the floor, Gtx and Grx are, respectively, the transmitting and the receiving antenna system gains. The value assumed by the parameter α is chosen according to the particular attenuation characteristics of the wireless channel. A value equal to 2 models the behavior of the free space, while α = 4 is considered adequate for a relatively lossy scenario, such as a two ray ground propagation environment. The typical value for the path-loss exponent in a dense urban environment, in presence of several buildings, ranges from 4 to 6.

2.1.2 Fading In a multipath scenario each signal component is characterized by its amplitude, phase shift, delay and Direction Of Arrival (DOA). A fundamental metric for de- scribing the behavior of the multipath channel is the Power Delay Profile (PDP), which provides the signal power as a function of the delay of the multipath com- ponents. Usually, in a wireless environment, the PDP has one or more peaks, whose presence indicates an inherent clustering of the delays. The information obtained from the PDP can be used to evaluate the delay spread, which is defined as: v uP ÃP !2 u Q P τ¯2 Q P τ¯ t q=1 rxq q q=1 rxq q σˆτ = PQ − PQ , (2.2) q=1 Prxq q=1 Prxq where Q is the number of multipath components, Prxq and τ¯q are, respectively, the power level and the delay corresponding to the q-th path. The delay spread is the standard deviation of the PDP and represents a measure of the time dispersion of the channel. The widening of the channel impulse response in the time domain can lead to InterSymbol Interference (ISI), an unwanted phenomenon in which the previously transmitted symbols have influence on the currently received received one. Another relevant feature of the wireless channel is caused by the Doppler effect, which is due to the relative motion between transmitter, receiver and obstacles. Doppler effect determines a frequency broadening of the received signal that is proportional to the relative motion speed and to the carrier frequency. By con- sequence, adjacent frequency channels may experience InterCarrier Interference 2.1. The wireless channel 23

(ICI). Besides, the combination of multipath and mobility leads to fluctuations of the received signal envelope (multipath fading), caused by the constructive and destructive addition of the signal replicas due to the different phase shifts. Multipath fading is defined as flat fading when the delay spread is much lower than the inverse of the receiver filter bandwidth Brx, while it is defined as fre- quency selective fading when σˆτ & 1/Brx, namely when the delay spread is larger or close to 1/Brx. In the first case the multipath characteristics of the channel do not degrade the received signal quality, while in the second case amplitude and phase distortions are experienced at the receiver. The temporal rate of change of the wireless channel is measured by the Doppler power spectrum, which provides statistical information regarding the variation of the frequency of a signal received by a mobile node traveling at a given speed. The classical approach, known as the Clarke model, assumes that the received signal comes from directions uniformly distributed in the azimuth domain. As- suming the use of a single λ/2 vertical , having power gain G(ϑ = π/2, ϕ) = 3/2 in the entire azimuth plane, the Doppler power spectrum for a flat fading channel is given by [12]:  ¯  3Prx d  v |f − f0| < f  u à !2  u f − f dt 0 S (f) = 2πf 1 − d , (2.3) D  f    0 elsewhere

¯ where Prx is the average received power from all multipath components, f0 is d the carrier frequency and the Doppler spread can be expressed as f = f0|~v|/vc, with ~v representing the relative vector speed. Multipath fading can also be dis- tinguished between fast fading when the Doppler spread is larger or close to the d inverse of the symbol duration Ts, and in slow fading when f << 1/Ts. Besides, d if the product σˆτ f is lower than one, the channel is said to be underspread, while, d if σˆτ f > 1 it is classified as overspread [13]. The small-scale fluctuations of the received power, leading to fast fading, can be observed over distances in the order of half wavelength. These variations are an- alytically described by proper statistic distributions that characterize the envelope and the squared envelope of the received signal.

2.1.2.1 Rayleigh fading When there is no direct path between the transmitter and the receiver, the entire received electric field is due to multipath. The in-phase component, xI(t), and the 24 Chapter 2. Propagation Channel Modeling

%FAD(z) 1.8

1.6

1.4

1.2

1

0.8

0.6

0.4

0.2

0 0 0.5 1 1.5 2 2.5 3 z

¯ Figure 2.1: Statistics of the received signal envelope for Prx = 1. Rice (KR = 2) Rayleigh Nakagami (mN = 4) Nakagami (mN = 1/2).

quadrature component, xQ(t), of the incoming signal can be modeled as complex Gaussian random processes. These two processes have zero mean because of the absence of Line Of Sight (LOS) between transmitter and receiver. Therefore, ap- qplying a bivariate transformation, it can be proved that the statistic of the envelope 2 2 xI (t) + xQ(t) follows a Rayleigh distribution:  2  2z − z  P¯rx ¯ e z ≥ 0 % (z) = Prx , (2.4) FAD   0 elsewhere

2 2 while the statistic of the squared envelope xI (t) + xQ(t) is exponential:   1 − z  P¯rx ¯ e z ≥ 0 %˜ (z) = Prx . (2.5) FAD   0 elsewhere Experimental studies have shown that Rayleigh fading is a proper model for heav- ily built-up urban environments, characterized by the presence of rich scattering 2.1. The wireless channel 25

%˜FAD(z) 3

2.5

2

1.5

1

0.5

0 0 0.5 1 1.5 2 2.5 3 z

¯ Figure 2.2: Statistics of the square of the received signal envelope for Prx = 1. Rice (KR = 2) Rayleigh Nakagami (mN = 4) Nakagami (mN = 1/2). and absence of LOS between the communicating nodes [14].

2.1.2.2 Rician fading The Rician distribution, instead, is suitable when, in addition to the multipath components, there exists a direct path between the transmitter and the receiver. The received signal envelope is characterized by the probability density function (pdf):   s   2 2z(K +1) (KR+1)z K (K +1)  R −KR− R R  e P¯rx I 2z  z ≥ 0 P¯ 0 P¯ % (z)= rx rx (2.6) FAD    0 elsewhere R 1 2π −z˜cos ϕ0 0 where I0(˜z) = 2π 0 e dϕ is the modified Bessel function of the first kind and zero-order, and KR is the Rice factor, representing the ratio between the power of the direct signal and the power of the scattered components. When KR = 0 the Rician distribution coincides with the Rayleigh distribution, while 26 Chapter 2. Propagation Channel Modeling

for KR → +∞ the channel does not exhibit fading. In presence of Rician fading the squared envelope has a non-central chi-square distribution with two degrees of freedom:   s   K +1 (KR+1)z K (K +1)z  R −KR− R R  e P¯rx I 2  z ≥ 0 P¯ 0 P¯ %˜ (z)= rx rx (2.7) FAD    0 elsewhere

In both cases (Rayleigh and Rice) the phase of the received signal is assumed uniformly distributed in [0, 2π].

2.1.2.3 Nakagami fading Another commonly adopted fading statistic, derived from empirical studies, has been introduced by Nakagami [12]. This distribution describes the envelope of the received signal by a central chi-square distribution with mN degrees of freedom:  Ã !mN 2mN−1 2  mN z − mNz  P¯  2 ¯ e rx z ≥ 0, mN ≥ 1/2 Prx Γ(mN) %FAD(z) = , (2.8)   0 elsewhere and the squared envelope by a Gamma density:  Ã !mN mN−1  mN z − mNz  P¯  ¯ e rx z ≥ 0, mN ≥ 1/2 Prx Γ(mN) %˜FAD(z) = , (2.9)   0 elsewhere

R +∞ mN−1 −z˜ where mN is also called the Nakagami parameter and Γ(mN) = 0 z˜ e d˜z is the Euler gamma function. The Nakagami parameter mN can be used to obtain more or less severe fading conditions with respect to the Rayleigh pdf. In partic- ular, for mN = 1 the Nakagami distribution coincides with the Rayleigh distrib- ution, while for mN → +∞ fading is absent. In essence, as mN gets larger the fading conditions become less severe. The Rice distribution can be closely ap- proximated by choosing the Nakagami parameter as a function of the Rice factor 2 KR according to mN = (KR + 1) /(2KR + 1). Besides, with respect to the Rice distribution, the Nakagami distribution has the advantage to provide in many cases closed form analytical expressions, thanks to the absence of Bessel functions. 2.2. Spatial channel models 27

2.1.3 Shadowing

Slow fading is due to long-term variations of the mean value of the received signal envelope. This phenomenon is also known as large-scale fading or shadowing, because the fluctuations in the mean signal level are usually caused by the node movement in the proximity of objects, such as buildings and hills, which produce a shadow effect. Empirical studies have shown that shadowing can be described by a log-normal distribution:

 2 1 − (log z−zS)  2σ2  √ e S z ≥ 0 % (z) = zσS 2π , (2.10) SHA   0 elsewhere

2 where σS and zS are the mean and the variance of log z, respectively. The usual value for the standard deviation σS, which is influenced by the density of the scatterers, ranges from 5 to 12 dB and have a slight dependence on frequency, but is nearly independent of the path length.

2.2 Spatial channel models

Classical models involve time and frequency domains, however, when advanced antenna array techniques are adopted, the spatial characteristics of the scattering environment have an enormous impact on the system performance. In the past years, researchers assumed that the DOAs of the received signal replicas were uniformly distributed in the entire azimuth plane. However, this hypothesis can be not realistic when referred to the uplink channel between a mobile node and a cellular base station, or considering the communication between the backbone nodes of a wireless mesh network in outdoor environment. With reference to the spatial domain, some parameters have been defined to take into account the antenna characteristics with respect to the spatial distribution of the different signal components [15]. In a multipath environment, the signal replicas arrive at the receiver with angles that, in general, are different from the mean DOA corresponding to the direct path. The Power Azimuth Spectrum (PAS) Pϕ(ϕ) and the angular spread σˆϕ are used to characterize the spatial properties of the channel in the azimuth domain. The PAS represents the power distribution along all the possible DOAs, while, from a theoretical point of view, the angular spread can be viewed as the square root of the variance of the PAS. In general, the angular spread (or azimuth spread) provides a measure of the angular dispersion 28 Chapter 2. Propagation Channel Modeling

Figure 2.3: The wireless channel.

of the channel and is defined as: v uP u Q P ϕ2 t q=1 rxq q 2 σˆϕ = PQ − ϕ0, (2.11) q=1 Prxq

where ϕq is the DOA of the q-th signal replica (having power Prxq ), and

PQ q=1 Prxq ϕq ϕ0 = PQ , (2.12) q=1 Prxq is the mean DOA. Recalling the definition given in [15], a channel is called low- 3dB rank if σˆτ << 1/Brx (flat fading), and σˆϕ << ϕ , while it is called high- 3dB rank if σˆτ & 1/Brx or σˆϕ & ϕ (Fig. 2.3). In a low-rank environment the spatial and temporal correlations between the signal replicas are very high and the incoming multipath components can be considered as confined within a small angle. In a high-rank environment, instead, the paths can be spread over a wide angular region, leading to a low spatial correlation. Referred to the spatial domain, this distinction depends both on the angular distribution of the DOAs and on the spacing between the antenna array elements, which influences the capabilities to discriminate the different paths. 2.2. Spatial channel models 29

2.2.1 Low-rank environment A low-rank channel model basically consists of a local scattering model around the transmitting node and is associated with the LOS component. The contri- butions from scatterers around the receiving node and from distant scatterers are considered negligible. Therefore, the distance and the height of the receiving node with respect to the transmitting ones play a fundamental role in determining the angular spread [16–17]. The study of the azimuthal dispersion in a low-rank scenario, where the angular distribution cannot be resolved by the main lobe of the antenna radiation pattern, gets a considerable interest in the field of multiple antenna techniques. This inter- est is due to three main motivations. • When the antenna array is adopted for interference suppression purposes, the main objective is to place pattern nulls towards the undesired sources. The nulls are much sharper than the main lobe and so the amount of residual interference incoming from directions different than the mean DOA have a considerable impact on the communication system performance. The sta- tistic of the angular distribution of each undesired source provides useful information for modeling in a realistic manner the interference mitigation capabilities of the antenna system. • Even if in a low-rank channel the main lobe of the radiation pattern is able to receive all multipath components relative to a desired source, the signal replicas are received with a lower gain as they become more distant from the mean DOA. Therefore, the PAS becomes helpful to take into account the degradation of the antenna power gain towards the directions corresponding to the desired source. • The knowledge of the PAS in a high spatial correlation environment im- proves the level of accuracy of the DOA estimation algorithms, which can be much higher than the HPBW. In fact, the actual resolution accuracy is mainly limited not only by the Signal to Noise Ratio (SNR), but also by the angular spread around the mean DOA. Several models have been developed in the literature to describe the PAS in dif- ferent low-rank propagation environments [18–23]. Some of these statistics have been analytically derived adopting a geometrical approach that takes into account the displacement of the scatterers in the proximity of the transmitting node. Other statistics have been derived by curve fitting techniques applied on empirical data collected during environmental measurements. In this second case a closed form expression that describes the position of the scatterers around the transmitter is difficult to obtain and usually numerical approaches are adopted to simulate the 30 Chapter 2. Propagation Channel Modeling

Pϕ(ϕ) 0.14

0.12

0.1

0.08

0.06

0.04

0.02

0 −60 −40 −20 0 20 40 60 ϕ (o)

Figure 2.4: Uniform PAS for Prx = 1 and ϕ0 = 0. o ∼ o σˆϕ = 5 (ϕ∆ = 8.7 ) o ∼ o σˆϕ = 10 (ϕ∆ = 17.3 ) o ∼ o σˆϕ = 20 (ϕ∆ = 34.6 ) channels that obey to these statistics. A brief overview of the most common dis- tributions for the PAS is provided in the following of this subsection.

2.2.1.1 Uniform distribution This statistic for the PAS has been proposed in [18], where it is assumed that the DOAs are uniformly distributed in the angular interval [ϕ0 −ϕ∆, ϕ0 +ϕ∆], defined by the mean DOA and by the width 2ϕ∆. The PAS, shown in Fig. 2.4 for three values of the angular spread, is described by:   Prx  |ϕ − ϕ0| ≤ ϕ∆ P (ϕ) = 2ϕ∆ , (2.13) ϕ   0 elsewhere where Prx denotes√ the power received from all directions and the angular spread is equal to ϕ∆/ 3. In practice, distributions of scatterers that lead to a uniform distribution of the 2.2. Spatial channel models 31

Pϕ(ϕ) 0.14

0.12

0.1

0.08

0.06

0.04

0.02

0 −60 −40 −20 0 20 40 60 ϕ (o)

Figure 2.5: Truncated cosine PAS for Prx = 1 and ϕ0 = 0. o σˆϕ = 5 (κ = 130) o σˆϕ = 10 (κ = 32) o σˆϕ = 20 (κ = 7)

DOAs are difficult to justify from a physical point of view. However, in some cases, this statistic is employed because it simplifies the calculations and enables the derivation of closed form analytical expressions.

2.2.1.2 Truncated cosine The truncated cosine distribution has been derived analyzing the results obtained from channel measurements in urban areas in the early 1970’s [19]. In particular, this statistic has been adopted to evaluate the correlation between two base station antennas. Analytically, the truncated cosine PAS can be described by:   Prxγc κ  cos (ϕ − ϕ0) |ϕ − ϕ0| ≤ π/2 P (ϕ) = π , (2.14) ϕ   0 elsewhere where γ is a proper constant that can be obtained imposing the normalization c R ϕ0+π/2 condition Pϕ(ϕ) = Prx, while the exponent κ determines σˆϕ (Fig. 2.5). ϕ0−π/2 32 Chapter 2. Propagation Channel Modeling

Pϕ(ϕ) 0.14

0.12

0.1

0.08

0.06

0.04

0.02

0 −60 −40 −20 0 20 40 60 ϕ (o)

Figure 2.6: Truncated Gaussian PAS for Prx = 1 and ϕ0 = 0. o o o σˆϕ = 5 σˆϕ = 10 σˆϕ = 20

To evaluate the desired κ value for a given angular spread, numerical techniques are usually adopted, even if, theoretically, a closed form computation is possible.

2.2.1.3 Truncated Gaussian The use of a truncated Gaussian has been proposed in [20] in order to provide a PAS model directly related to the angular spread. This PAS is described by:

 2 (ϕ−ϕ0)  PrxγG − 2  2ˆσϕ  √ e |ϕ − ϕ0| ≤ π/2 P (ϕ) = 2πσˆϕ , (2.15) ϕ   0 elsewhere where γG is the normalization constant. For small values of the angular spread the truncated cosine and the Gaussian distributions are very close to each other, as it can be noticed by comparing Fig. 2.5 and Fig. 2.6. The truncated cosine provides a realistic behavior for the uplink channel between a mobile node and a cellular base station, but the κ values that are required to model a low-rank environment, being in the order of 100, are not practical. The Gaussian distribution, instead, allows a closed form computation as a function of the angular spread, while representing a proper model for the PAS. 2.2. Spatial channel models 33

Figure 2.7: Ring of scatterers model.

2.2.1.4 Ring of scatterers The PAS can also be derived geometrically, taking into account the displacement of the scatterers inside a region close to the transmitter. Considering a uniform distribution of the scatterers on a circumference of radius d˜surrounding the transmitting node, it can be assumed that the transmitted power is uniformly distributed in the angle ϕ˜ (Fig. 2.7). In particular, the power scattered by the differential element of ϕ˜, dϕ ˜, can be evaluated as: P dP = rx dϕ. ˜ (2.16) 2π The angle ϕ˜ can be calculated by geometrical considerations from:

d d˜ = , (2.17) sin[π − ϕ˜ − (ϕ − ϕ0)] sin(ϕ − ϕ0)

where d is the distance between the transmitter and the receiver. Defining γm1 = arcsin(d/d˜ ), (2.17) can be written as: · ¸ sin(ϕ − ϕ0) ϕ˜ = arcsin − (ϕ − ϕ0), (2.18) sin γm1 to obtain ϕ˜ as a function of the generic azimuth DOA. The power received at the differential element of ϕ, dϕ, can be evaluated as 2dP because, for any given azimuth, the power contribution is due to the portion of the ring facing the array and the portion on the opposite side. Therefore, the PAS can be obtained from: P dϕ ˜ P (ϕ) = 2 rx , (2.19) ϕ 2π dϕ 34 Chapter 2. Propagation Channel Modeling

Pϕ(ϕ) 0.14

0.12

0.1

0.08

0.06

0.04

0.02

0 −60 −40 −20 0 20 40 60 ϕ (o)

Figure 2.8: PAS corresponding to the ring of scatterers geometry for Prx = 1 and ϕ0 = 0. o ∼ o σˆϕ = 5 (γm1 = 7.3 ) o ∼ o σˆϕ = 10 (γm1 = 15.1 ) o ∼ o σˆϕ = 20 (γm1 = 28.3 ) which provides the following expression:  p P cos(ϕ − ϕ ) − sin2 γ −sin2(ϕ−ϕ )  rx 0 m1 0  p |ϕ − ϕ0| < γm π sin2 γ −sin2(ϕ−ϕ ) 1 Pϕ(ϕ)= m1 0 (2.20)   0 elsewhere The PAS corresponding to the ring of scatterers presented here has been calculated adopting the process proposed in [21] for the case d˜ << d. For small values of

γm1 , (2.20) becomes:   Prx  p |ϕ − ϕ0| < γm π γ2 − (ϕ − ϕ )2 1 P (ϕ) = m1 0 , (2.21) ϕ   0 elsewhere which coincides with the expression presented in [21]. From the curves in Fig. 2.8 it can be noticed that, differently from the previous distributions, the mean DOA 2.2. Spatial channel models 35

Pϕ(ϕ) 0.14

0.12

0.1

0.08

0.06

0.04

0.02

0 −60 −40 −20 0 20 40 60 ϕ (o)

Figure 2.9: PAS corresponding to the disk of scatterers geometry for Prx = 1 and ϕ0 = 0. o ∼ o σˆϕ = 5 (γm2 = 10.1 ) o ∼ o σˆϕ = 10 (γm2 = 20.0 ) o ∼ o σˆϕ = 20 (γm2 = 40.0 ) is associated to the minimum power and the major contribution is given by the farther components.

2.2.1.5 Disk of scatterers The spatial propagation model deriving from a disk of scatterers has been pre- sented in [22] and is also known as the Geometrically Based Single Bounce Macrocell (GBSBM) channel model. The PAS is determined by the diameter of the disk surrounding the transmitter. This diameter defines a circle, called cir- cle of influence, in which the scatterers are considered uniformly distributed. The PAS, plotted in Fig. 2.9, is described by:  p 2 2 2Prx cos(ϕ−ϕ0) sin γm −sin (ϕ−ϕ0)  2 |ϕ − ϕ | ≤ γ π sin2 γ 0 m2 P (ϕ)= m2 (2.22) ϕ   0 elsewhere where γm2 denotes the maximum angular shift from mean DOA. 36 Chapter 2. Propagation Channel Modeling

Pϕ(ϕ) 0.14

0.12

0.1

0.08

0.06

0.04

0.02

0 −60 −40 −20 0 20 40 60 ϕ (o)

Figure 2.10: Truncated Laplacian PAS for Prx = 1 and ϕ0 = 0. o o o σˆϕ = 5 σˆϕ = 10 σˆϕ = 20

2.2.1.6 Truncated Laplacian Recent field measurements reveal a PAS having a Laplacian distribution around the mean DOA. The empirical data have been obtained in areas characterized by buildings ranging from four to six floors and irregular street grids, corresponding to a typical urban environment. The statistic is described by [23]:

 √  PrxγL − 2|ϕ−ϕ0|  σˆϕ  √ e |ϕ − ϕ0| ≤ γm1 P (ϕ) = 2ˆσϕ , (2.23) ϕ   0 elsewhere where γL is the normalization constant. The truncated Laplacian PAS suggests that the distribution of scatterers is not uniform in area, but more energy is re- flected from the regions closer to the transmitter (Fig. 2.10). As described in [21], this phenomenon may be due to a shielding effect of the scatterers that are closer to the transmitter with respect to the farther scatterers. Besides, additional prop- agation loss may occur due to the larger distance of these scatterers from the transmitter. Chapter 3

Multiple Antenna Systems

This chapter introduces the main advantages of multi-antenna techniques and provides a classification, based on the wireless channel characteristics, of the different multiple antenna approaches. The fundamental concepts regarding Mul- tiple Input Multiple Output (MIMO) systems, spatial diversity, fixed and adaptive beamforming, are presented, and some common theoretical definitions are illus- trated. Besides, with particular reference to a low-rank environment, some of the most frequently adopted signal processing algorithms are recalled from the literature.

3.1 Benefits of multi-antenna systems

The recent development of high bit rate applications, such as multimedia stream- ing and video conferencing, together with the raised number of users, have in- creased the bandwidth demand in both cellular and Wireless Local Area Network (WLAN) environments. Traditionally, user communications are separated by fre- quency, as in Frequency Division Multiple Access (FDMA), by time, as in Time Division Multiple Access (TDMA), or by code, as in Code Division Multiple Ac- cess (CDMA) [24]. Recently, the possibility of separating the different users by space has led to the development of a new multiplexing technique, called Space Division Multiple Access (SDMA) [25]. The fundamental element of SDMA is the antenna array, whose elements are dynamically controlled to produce multiple beams towards the desired directions and nulls towards the undesired ones. The use of multi-antenna techniques, only recommended for Beyond Third Generation (B3G) cellular systems, represents a key concept in Fourth Generation () sys- tems and in WLAN scenarios for supporting higher bit rates [26]. The increased interest of researchers, operators and manufacturers in multi-antenna technologies

37 38 Chapter 3. Multiple Antenna Systems is due to some fundamental benefits that can be achieved in terms of quality, ca- pacity and communication reliability [27–28]. Antenna arrays can be employed to improve the link quality by combating the effects due to multipath propagation. Alternatively, adopting multiple antennas, the different signal paths can be exploited to combat fading by spatial diversity techniques or can be used to increase the link capacity by allowing transmission of different data streams from different antennas. Therefore, the amount of traffic that can be sustained by a communication system for a given frequency bandwidth can be increased, leading to considerable spectral efficiency improvements. Antenna arrays can also be employed to focus the energy towards certain direc- tions and to mitigate or, adopting more sophisticated adaptive solutions, to sup- press the transmission/reception towards other directions. This leads to a reduc- tion of the transmitted/received interference and enables the spatial filtering of the incoming signals. Wireless networks in which the topology is subdivided by cells, such as the wire- less mesh networks or the classical cellular systems, may obtain large benefits from the adoption of multiple antennas. In particular, the increased coverage range, which decreases the power requirements, and the possibility to track the mobile nodes using proper non-overlapping beams, reduce the number of required handovers together with the need to deploy new base stations or mesh routers. Therefore, multi-antenna technology may have a considerable impact not only in terms of performance improvement, but also in terms of cost reduction for wire- less operators.

3.2 Classification

As described in Section 2.2, the wireless propagation environment can be classi- fied as high-rank or low-rank, depending on the angular spread of the channel, the separation between the antenna elements, the delay spread and the signal band- width. This interaction between the characteristics of the multipath channel and the physical properties of the antenna system determines the received signal statis- tics. In particular, the different multi-antenna approaches can be classified taking into account the spatial fading correlation between the signals received by the dif- ferent elements of the array (Fig. 3.1). In a low correlation environment (high-rank channel) it is expected that the different multipath components provide a statisti- cally independent behavior, which can be exploited by spatial multiplexing, to increase the bit rate, or by diversity, to improve the reliability of the communi- cations. In particular, the objective of MIMO-spatial multiplexing is the increase of the system capacity, while spatial diversity is adopted to reduce the Bit Error Rate (BER). In a high correlation environment (low-rank channel), instead, fixed 3.3. MIMO-spatial multiplexing 39

Figure 3.1: Classification of multiple antenna systems.

and adaptive beamforming techniques are adopted for maximizing the Signal to Interference plus Noise Ratio (SINR) at the antenna system output. This goal is obtained focusing the energy towards certain desired directions and mitigating or suppressing the energy towards the undesired ones.

3.3 MIMO-spatial multiplexing

MIMO systems represent one of the most promising research areas of wireless communications. The use of multiple antennas at both the receiver and the trans- mitter in a high-rank channel can significantly increase the link capacity, enabling the exploitation of multiple parallel radio channels in the same frequency band by separation in space. Adopting a MIMO system, the data stream from a single user is demultiplexed into Ntx spatial streams, corresponding to the number of transmitting antennas, and encoded into channel symbols. At the receiver side the streams are received by Nrx antennas and separated using proper signal process- ing techniques. The spectral efficiency increase that is achievable adopting MIMO technology is due to the fact that, in a rich scattering environment, the different signal paths incoming from the transmitter appear highly uncorrelated at each re- ceiving antenna. The receiver can exploit this property to separate the signals originated from the different transmitting antennas, enabling the simultaneous re- ception of multiple spatial streams at the same frequency. From the theoretical point of view the performance improvement provided by MIMO techniques can be quantified by the ergodic capacity, which is defined as the average of the maximum value of the mutual information between the trans- mitted and the received signal. Denote as H = [hkk0 ] the Nrx ·Ntx transfer channel matrix in a narrowband MIMO system, where hkk0 is the complex path gain from the k0-th transmitting antenna to the k-th receiving antenna (Fig. 3.2). Assum- 40 Chapter 3. Multiple Antenna Systems

Figure 3.2: MIMO system. ing that the coefficients of H are uncorrelated circularly symmetric Gaussian with zero mean and unit variance, and that the channel is unknown at the transmitter but perfectly known at the receiver, the ergodic capacity can be expressed as [29]: ½ · µ ¶¸¾ ¯ H Pout_sa HH C = E log2 det INrx + , (3.1) W Ntx ¯ where E{·} is the expectation, INrx is the identity matrix of rank Nrx, Pout_sa is the average power at the output of the generic receiving antenna and W is the noise H power. Fixing the value of Nrx in (3.1), it can be shown that HH /Ntx → INrx for Ntx → ∞. Therefore, if the number of transmitting antennas is very large, ¯ the ergodic capacity approaches Nrx log2(1 + Pout_sa/W ), growing linearly in the number of receiving antennas. Instead, if Ntx is not very large and if Nrx ≤ rank(H), with rank(H) representing the rank of matrix H, the ergodic capacity can be approximated in a high signal to noise ratio regime by [30]: µ ¶ à ! ¯ NXmin NmaxX−k ∼ 1 Pout_sa 1 1 C = Nmin log2 + 0 − γENmin , (3.2) Ntx W log 2 k k=1 k0=1 ∼ where Nmin = min(Ntx,Nrx), Nmax = max(Ntx,Nrx) and γE = 0.577 is the Euler-Mascheroni’s constant. In particular, (3.2) states that, in a rich scattering 3.4. Spatial diversity 41 environment, the number of available spatial streams between the transmitter and the receiver is constrained by the minimum between the number of antennas at the transmitter and at the receiver. This situation holds until the rank of the channel matrix is sufficiently high and so the signals arriving at the receiving antennas are uncorrelated. When the rank of H is reduced, the system capacity decreases. It is worth noticing that, even if the high-rank property of the channel is necessary to achieve a high spectral efficiency in a MIMO channel, low correlation does not guarantee high capacity with certainty. In [31], the authors prove the existence of degenerate channels, called “keyholes”, in which the matrix H has poor rank properties even if the antennas both at the transmitter and at the receiver sides exhibit low fading correlation.

3.4 Spatial diversity

Diversity exploits the available copies of a signal to minimize fading effects and can be realized adopting different approaches. A can be obtained by transmitting multiple copies of the signal at intervals larger than the coherence time in order to provide time uncorrelated replicas (time diversity). Other di- versity techniques exploit different polarizations (polarization diversity), different frequencies (frequency diversity), and multiple transmit and/or receive antennas (spatial diversity). Fundamentally, a multi-antenna receiver can be implemented adopting four ba- sic approaches: selection diversity, feedback diversity, Maximal Ratio Combining (MRC) and equal gain combining. In the first case the receiver selects the largest signal from those available at the different antenna elements, while in the sec- ond case the antenna outputs are scanned to find the highest SNR. In MRC, the signals are weighted, co-phased and summed, while in equal gain combining the signals are co-phased but summed with unity weights. Spatial receive diversity techniques, and in particular MRC, require the channel knowledge at the receiver to perform the coherent combining of the signal replicas. Instead, spatial transmit diversity can be achieved with and without channel knowledge. When the channel coefficients are known, the signal is transmitted from antennas experiencing inde- pendent fading (adopting antenna selection or weighting techniques) in order to maximize the signal power at the receiver. If no channel information is available, the signal can be transmitted from different antennas through Space-Time Coding (STC), which provides space and time diversity. One of the most efficient and simple STC techniques, employing only two transmit antennas, is the Alamouti scheme [33]. Transmit and receive diversity can be combined to obtain a diversity order equal to the product of the number of transmit and receive antennas. By consequence, the 42 Chapter 3. Multiple Antenna Systems

Figure 3.3: Analog beamforming.

MIMO channel provides NtxNrx degrees of freedom that can be exploited for di- versity purposes, (link quality improvement), or to perform spatial multiplexing, (link capacity increase). This imposes a tradeoff between bit rate enhancement and communication reliability. Recent research studies have addressed this topic by investigating which fraction of the degrees of freedom should be used for di- versity, employing the remaining ones to improve the capacity [34–35].

3.5 Beamforming in low-rank environment

The term “beamforming” is used to denote an array processing technique for esti- mating one or more desired signals. The output provided by each antenna element is weighted according to a certain criterion in order to distinguish the spatial prop- erties of a signal of interest from noise and interference. The name beamforming comes from the early forms of antenna arrays that were used to generate pencil beams, so as to receive signals from a specific direction and attenuate signals in- coming from other directions. From this primary meaning related to propagation environments characterized by a low angular spread, beamforming has been ex- tended to rich scattering scenarios and, at present, this term is used to denote the antenna processing techniques operating both in low and high-rank channels. In a low-rank environment, depending on the level of sophistication of the adopted processing algorithm, beamforming techniques can be subdivided in two main groups: fixed beamforming and adaptive beamforming. In the first case the in- terference is mitigated but not suppressed and the system can be usually realized at a reasonable cost. Adaptive antennas, instead, require the adoption of complex signal processing algorithms in order to steer the main lobe towards the desired 3.5. Beamforming in low-rank environment 43

Figure 3.4: Digital beamforming. direction and to suppress the undesired sources. This second approach leads to optimal performance, but is more expensive and needs considerable implementa- tion efforts. A narrowband beamformer is a processor operating on the input signals at the N antennas as a single linear combiner with coefficients equal to the antenna weights T N×1 w = [w1, ..., wN ] ∈ C . Therefore, the array output can be expressed as:

XN ∗ H y(t) = wkxk(t) = w x(t), (3.3) k=1

T where x(t) = [x1(t), ..., xN (t)] is the received signal vector at the N antennas [36]. Theoretically, these weights may be applied directly at the Radio Frequency (RF) stage, realizing a beamforming network with analog devices (Fig. 3.3). This choice is rather costly due to the high quality required for the RF components. Analog beamforming needs precise phase shifters and selective power dividers. Most of the analog beamformers are used to form a unique lobe towards a de- sired direction, while multiple lobes are usually difficult to realize. However, considering that phase control elements are widely available and that many ex- isting systems do not possess the capability for amplitude weighting, the use of analog phase-shifters alone represents an effective approach to simplify the hard- ware design [37]. Therefore, a large number of phase-only synthesis algorithms have been developed in the literature [38–43]. Inevitably, phase-only weighting provides lower performance with respect to phase-amplitude weighting. It is well known that an array of N antenna elements, in which the weights can be modified both in amplitude and phase, provides N − 1 degrees of freedom. The one dimen- sional constraint regarding the desired direction reduces this number to N − 2, which represents the number of directions that can be suppressed. In phase-only control systems this number of degrees of freedom is further reduced because of 44 Chapter 3. Multiple Antenna Systems

Figure 3.5: Switched-beam technique. the constant amplitude constraint. Unfortunately, there are no theorems for the case of phase-only weighting that provide, in general, the remaining number of degrees of freedom. From a logical point of view, the philosophy of digital beamforming is similar to that of analog beamforming in the sense that both techniques adjust the antenna weights, but using a different practical approach (Fig. 3.4). In digital beamform- ing the received RF signals are downconverted to Intermediate Frequency (IF) and then digitized by Analog-to-Digital Converters (ADCs). The DownConverter (DC) is adopted to simplify the digitization process, which gets more complex as the frequency increases. The availability of digital signals enables the use of a considerable number of processing algorithms [5, 36,44–45], because the adapta- tion can be performed by the controlling software at a lower frequency.

3.6 Fixed beamforming

Fixed beamforming does not perform the amplitude weighting of the received signals and can be realized adopting either an analog approach (e.g. switched- beam, delay and sum) or a digital approach (e.g. beam-space beamforming).

3.6.1 Switched-beam antennas The simplest technique for improving the performance of the system considers the use of multiple fixed beams (Fig. 3.5) [45]. Switched-Beam Antennas (SBAs) generate a finite number of radiation patterns, thus making one RF signal available 3.6. Fixed beamforming 45

Figure 3.6: Delay and sum beamforming.

for each possible beam. The patterns are synthesized using an RF network that combines the signals received by the N antennas in order to form the different beams looking towards certain directions. The RF network () is realized adopting analog phase shifters [46]. An RF switch selects, from inside the set of available outputs, the signal with the highest SINR that will be further processed by the Low Noise Amplifier (LNA) and, after downconversion, will be digitized. This technique requires only a single transmitting/reciving chain, but its performance is limited by the impossibility to perform a continuous beam and null steering.

3.6.2 Delay and sum beamforming The most ancient form of spatial filtering that adopts an analog approach is the delay and sum beamforming, where delays are used instead of phase shifters (Fig. 3.6) [36]. For narrowband signals this scheme is substantially equivalent to switched-beam, but the delay and sum technique can also be applied to broadband signals. Depending on the delays, the antenna array isolates the signal for certain directions, but the interference is not specifically taken into account, because this scheme does not perform any amplitude weighting.

3.6.3 Beam-space beamforming The two previous methods were both examples of analog fixed beamforming. Beam-space, instead, is a fixed beamforming technique that adopts a digital ap- proach. Rather than directly weighting the signals incoming on the array elements, the antenna outputs can be first processed in order to produce a set of orthogonal 46 Chapter 3. Multiple Antenna Systems

Figure 3.7: Beam-space beamforming.

multiple beams (Fig. 3.7). Assuming the use of an N elements ULA with in- terelement spacing ρl, the generic component of the array weight vector has the form: −j 2π ρ k sin ϕ e λ l k0 , k = 0, ..., N − 1, (3.4) where the set of directions is selected according to:

0 k λ 0 sin ϕk0 = , k = 0, ..., N − 1. (3.5) Nρl

Substituting (3.5) in (3.4), one obtains a generic Discrete Fourier Transform (DFT) element:

0 −j2π k k 0 wk0k = e N , k = 0, ..., N − 1, k = 0, ..., N − 1. (3.6)

The DFT outputs x = DFTN [x] correspond to N orthogonal directions that can be further processed (selected and weighted in phase) to provide the final desired output.

3.7 Adaptive beamforming

Adaptive Antennas (AAs) are also referred to in literature as smart antenna sys- tems and represent advanced techniques able to maximize the SINR at the array output. They find application in environments where the spatial correlation be- tween the signal replicas is high. The radiation pattern is dynamically controlled to perform the electrical to a desired direction, and null steering to reject interfering signals. Considering a multipath environment, where Ql signal replicas arrive from the l-th generic source, the i-th sample of the signal received 3.7. Adaptive beamforming 47

by an N elements antenna array from ntx transmitting sources can be described by:

Q −1 1 nXtx−1 Xl 1 x(i) = s0(i) a(ϕ0) + sl(i − τ¯lq)a(ϕlq) + ˜nG(i), (3.7) Υ˜ Υ˜ | {z0 } l=0 q=0 if l6=0 lq q=1 if l=0 xs(i) | {z } xu(i)

˜ where sl(i) is the i-th sample of the signal transmitted by the l-th source, Υlq is the complex attenuation of the q-th replica of the l-th source incoming from ϕlq direction with delay τ¯lq, a(ϕlq) is the steering vector in the azimuth domain that, as described in Section 1.3, depends on the array geometry, and ˜nG(i) represents the Gaussian noise vector. Without loss of generality, in (3.7), it is assumed that l = 0 represents the desired direction. In signal processing theory the received signal is usually decomposed in two parts, one corresponding to the desired signal, xs(i), and one including interference and noise, xu(i), which are used to define the array correlation matrices:

© H ª N×N Rxx = E x(i)x (i) ∈ C , (3.8a) © H ª N×N Rss = E xs(i)xs (i) ∈ C , (3.8b) © H ª N×N Ruu = E xu(i)xu (i) ∈ C . (3.8c)

Assuming that the processes x(t), xs(t), xu(t) are ergodic in the correlation ma- trix, (3.8) are usually approximated by their noisy estimates:

1 XNas R ∼= R˜ = x(i)xH (i), (3.9a) xx xx N as i=1 1 XNas R ∼= R˜ = x (i)xH (i), (3.9b) ss ss N s s as i=1 1 XNas R ∼= R˜ = x (i)xH (i), (3.9c) uu uu N u u as i=1

where Nas is the number of available samples. The information contained in the correlation matrices is fundamental in digital array processing because the weight vector is estimated by methods based on the eigenanalysis of these matrices. Adaptive antennas can be subdivided into three groups: spatial reference, tempo- ral reference and blind techniques. This classification is performed distinguishing among the information required by the antenna system to realize the adaptation. 48 Chapter 3. Multiple Antenna Systems

Figure 3.8: Spatial reference technique.

Spatial reference techniques use the DOAs of the incoming signals, temporal ref- erence methods employ a reference signal, while blind techniques exploit some a priori known characteristics of the desired signal. The following subsections provide a brief description of each group of algorithms.

3.7.1 Spatial reference techniques Spatial reference techniques perform the antenna system adaptation using the DOAs relative to the multipath components of the desired and of the interfer- ing signals. In practice two algorithms are needed, one to estimate the DOAs and one to estimate the antenna weights (Fig. 3.8). The beamforming algorithms are developed in order to maximize the SINR at the array output, which, using the correlation matrices, can be expressed as: © ª H 2 H E |w xs(i)| w Rssw SINR = H 2 = H . (3.10) E {|w xu(i)| } w Ruuw

It is known from the literature that the Minimum Variance Distortionless Response (MVDR) beamformer is able to maintain an undistorted array response to the desired signal while minimizing the output interference plus noise power [47]. Therefore, the problem can be reformulated as finding:

H min w Ruuw (3.11) w 3.7. Adaptive beamforming 49 subject to the constraint: H w a(ϕ0) = 1. (3.12) The solution can be calculated by means of the Lagrange multiplier method, by minimizing the function:

H H F(w, γF ) = w Ruuw + γF [1 − w a(ϕ0)]. (3.13)

Taking the gradient and setting it to zero, one obtains the MVDR beamformer:

−1 Ruu a(ϕ0) wopt = H −1 . (3.14) a (ϕ0)Ruu a(ϕ0)

In practice, when the estimate of Ruu is not available, the total array correlation matrix Rxx is used to estimate the weights. In this case, the optimum weights H are selected by minimizing the mean output power w Rxxw, while maintaining unity response in the look direction. More precisely, the optimum weight vector can be simply obtained from (3.14) by replacing Ruu with Rxx. The MVDR beamformer is computationally consuming because it requires the −1 calculation of Rxx and Rxx together with the estimation of the DOAs. There- fore, some techniques have been developed to reduce the computational bur- den. The two main approaches are the Frost and the Howells-Applebaun algo- −1 rithms [48–49], which do not require the calculation of Rxx and converge to the optimum weights by recursively updating w. However, all the beamformers based on spatial reference methods need the knowledge of the direction of arrivals of the incoming signals.

3.7.1.1 DOA estimation algorithms The most common techniques for DOA estimation can be distinguished between spectral based and parametric algorithms. Spectral based algorithms use a func- tion, called pseudospectrum, in which the maxima give an indication of the DOAs. A large number of spectral based solutions have been proposed in literature, such as the Bartlett method, the Capon estimate, the linear prediction method, the max- imum entropy method and many others [5]. A simple and widely adopted technique is the MUltiple SIgnal Classification (MUSIC) algorithm, which exploits the eigenstructure properties of the array cor- relation matrix [36]. The method assumes that the noise at different antenna elements is uncorrelated. In general, the incident signals can be correlated, al- though the MUSIC algorithm becomes ineffective when this correlation becomes too high. When ntx(< N) directions must be estimated, the space spanned by the eigenvectors of Rxx can be partitioned in two orthogonal subspaces: the sig- nal subspace Vs and the noise subspace Vn. The signal subspace is generated by 50 Chapter 3. Multiple Antenna Systems

Figure 3.9: ESPRIT algorithm.

the eigenvectors associated to the ntx largest eigenvalues of Rxx, while the noise subspace is spanned by the eigenvectors associated to the N − ntx smallest eigen- values of Rxx. The steering vectors corresponding to the directional sources are orthogonal to the noise subspace and are contained in the signal subspace. The ntx DOAs are estimated by evaluating the maxima of the MUSIC pseudospectrum:

˜ 1 SMUSIC(ϕ) = H H , (3.15) a (ϕ)VnVn a(ϕ) where a(ϕ) is usually redefined, in the DOA estimation terminology, as scanning ˜ vector. When SMUSIC(ϕ) has a local maximum, its denominator has a local min- imum and so this method estimates the direction of arrival by searching the most 3.7. Adaptive beamforming 51 orthogonal scanning vectors a(ϕ) to the noise subspace. The MUSIC algorithm is characterized by a certain computational complexity, but can be applied to an- tenna arrays of arbitrary geometry. Another family of algorithms for DOA estimation, alternative to spectral based techniques, adopts a parametric approach. A robust and computationally effi- cient algorithm is the Estimation of Signal Parameters via Rotational Invariance Techniques (ESPRIT). ESPRIT is a parametric method that exploits the rotational invariance in the signal subspace which is provided by two (sub)arrays with trans- lational invariance structure. The array geometry must be properly chosen to make possible the selection of two subarrays having this property. For example, a ULA with N antenna elements and interelement spacing ρl can be viewed as two subar- rays, where the first subarray is formed by the first N − 1 elements and the second subarray is formed by the last N − 1 elements. One obtains two subarrays sep- arated by a distance ρl, where the k-th element of the first subarray and the k-th element of the second subarray form the k-th pair. The algorithm uses the correla- tion matrices RX and RY of the two subarrays to estimate the DOAs. The overall procedure is briefly summarized in Fig. 3.9. The above explanation is referred to a linear geometry, however, ESPRIT can be also applied to rectangular, triangular and circular arrays [50–51]. In general, adopting spatial reference techniques, both beamforming and DOA estimation algorithms require careful array calibration in order to precisely deter- mine the physical characteristics of the antenna system. Mutual coupling between the array elements lead to distorted single element patterns that can hardly affect the accuracy of the results.

3.7.2 Temporal reference techniques Temporal reference techniques perform the antenna system adaption using a ref- erence signal (training sequence) yd(i) that is known both at the transmitter and at the receiver (Fig. 3.10). The array output y(i) is subtracted from yd(i) to generate an error ye(i) = yd(i) − y(i) which is used to control the weight vector. In par- ticular, w is adjusted in order to minimize the Mean Square Error (MSE) between the array output and the training sequence: © 2ª © 2ª H H MSE = E |ye(i)| = E |yd(i)| − 2w ˜y + w Rxxw, (3.16) where ˜y = E {x(i)yd(i)}. The MSE surface is a quadratic function of w and is minimized by imposing its complex gradient with respect to w equal to zero: © 2ª ∇w∗ E |ye(i)| = −2˜y + 2Rxxw, (3.17) which leads to the Wiener-Hopf equation for the optimal weight vector: −1 wopt = Rxx ˜y. (3.18) 52 Chapter 3. Multiple Antenna Systems

Figure 3.10: Temporal reference technique.

The complete solution of the Wiener-Hopf equation requires the computation of −1 the inverse of the array correlation matrix Rxx and the calculation of ˜y. However, other techniques can be employed to reduce the computational burden, such as the unconstrained Least Mean Square (LMS) algorithm and the Recursive Least Square (RLS) algorithm [36].

3.7.2.1 Unconstrained LMS algorithm

The LMS algorithm is referred to as constrained LMS when the estimated weights are subjected to constraints at each iteration, while it is referred to as uncon- strained LMS when the weights are not constrained at each iteration. This second option is mainly applicable when w is iteratively calculated exploiting a reference signal. LMS updates the weights at each iteration by estimating the gradient of the MSE quadratic error surface and then moving the weights in the opposite direction with respect to the gradient by a small quantity, which is determined by a constant called step size γLMS. This constant largely influences the convergence charac- teristics of the algorithm in terms of speed and closeness to the optimal solution. Unconstrained LMS uses an estimate of the gradient by replacing Rxx and ˜y with their noisy estimates available at (i + 1)-th iteration, namely x(i + 1)xH (i + 1) and x(i + 1)yd(i + 1), respectively. Therefore, the weights are updated from:

∗ w(i + 1) = w(i) − γLMSx(i + 1)ye (i) (3.19a) H ye(i) = w (i)x(i + 1) − yd(i + 1) (3.19b) 3.7. Adaptive beamforming 53

and the convergence is guaranteed if 0 < γLMS < 1/νmax, where νmax denotes the maximum eigenvalue of Rxx. Under this condition the algorithm is stable and w converges to the optimum weight vector. However, for practical purposes, the following alternative (and more restrictive) condition can be applied: 1 0 < γLMS < , (3.20) tr (Rxx) where tr (Rxx) represents the trace of Rxx. This option is often preferred because the calculation of tr (Rxx) is easier to perform as compared to the estimation of the eigenvalues of Rxx. The excess MSE produced by the LMS algorithm with respect to the theoretical minimum, corresponding to optimal solution, is mainly influenced by the minimum eigenvalue νmin of Rxx. As the spread of the eigenval- ues increases, the highest γLMS value that guarantees the stability decreases. The selection of a too small step size results in a lower rate of convergence, while an excessively high value of γLMS leads to a rapid achievement of the solution, but the weights fluctuate inside a larger region and the excess MSE is larger. The main advantage of the LMS algorithm is its implementation simplicity, while its main drawback is the sensitivity of the convergence behavior to the eigenvalue spread.

3.7.2.2 RLS algorithm The problem related to the influence of the eigenvalues on the convergence char- acteristics of the LMS algorithm is solved by the RLS algorithm, in which the ˆ gradient step size is replaced by a gain matrix Rxx, which is estimated at each iteration. The RLS algorithm minimizes the Cumulative Square Error (CSE) ex- ponentially weighted, which is defined at the i-th iteration as: Xi i−i0 0 2 CSE(i) = γRLS|ye(i )| , (3.21) i0=0 where γRLS ∈ (0, 1) is called the forgetting factor, as the update equation tends to deemphasize the old samples. The weights are updated using: ˆ −1 ∗ w(i) = w(i − 1) − Rxx (i)x(i)ye (i − 1), (3.22) where, the gain matrix at i-th iteration is estimated as:   1  IN i = 0  γ˜RLS ˆ −1 Rxx (i)= " # ,  ˆ −1 H ˆ −1  1 −1 Rxx (i−1)x(i)x (i)Rxx (i−1)  Rˆ (i−1)− i > 0 γ xx H ˆ −1 RLS γRLS + x (i)Rxx (i−1)x(i) (3.23) 54 Chapter 3. Multiple Antenna Systems

and γ˜RLS > 0. As compared to the LMS algorithm, the RLS approach presents a higher complexity, but provides a higher speed of convergence and performs bet- ter in flat fading channels [53]. With respect to spatial reference techniques, temporal reference techniques re- quire the use of a reference signal. This leads to an increased overhead during packet transmission, because a preamble must be added to the packet payload to allow the adaptation process. However, using temporal reference algorithms, a precise characterization of the physical antenna system is not required. In fact, mutual coupling effects among the array elements are transparently handled dur- ing the adaptation routine and the estimation of the distorted single element radi- ation patterns is not necessary.

3.7.3 Blind techniques Temporal reference systems require synchronization and demodulation before per- forming the weight adaptation, whereas spatial reference systems need DOA es- timation and very strictly calibrated hardware. Blind techniques, instead, do not necessitate training sequences or any information regarding the physical antenna system, because they are based on the a priori knowledge of some characteristics of the desired signal. The most common algorithm adopting the blind approach is the Constant Modulus Algorithm (CMA) [54]. This algorithm operates on the principle that the amplitude of the communication signal is distorted by interfer- ence and multipath fading. Otherwise, the signal should have a constant envelope. The CMA tries to restore this envelope in an average sense by minimizing the following cost function: 1 © ª F (w) = E [|y(i)|2 − y2]2 , (3.24) CMA 2 0 where y0 represents the desired amplitude in absence of interference and the an- tenna system output y(i) is a function of w. The minimization of (3.24) can be performed adopting the LMS approach that leads to the following iterative solu- tion for the beamforming weight vector:

2 2 w(i + 1) = w(i) − γLMSx(i + 1)y(i)[|y(i)| − y0]. (3.25)

∗ 2 2 It can be observed that, defining the error term as ye(i) = y (i)[|y(i)| − y0], (3.25) becomes equal to the update equation of the LMS algorithm expressed by (3.19a). The two conditions which may lead to stop the adaptation are |y(i)| = y0, representing the desired convergence, and |y(i)| = 0. This second case is not a practical problem, since the system noise moves the weight vector away from this unstable zero gradient point [28]. The main drawback of CMA is that, in an hostile 3.7. Adaptive beamforming 55 fading environment, the algorithm may incorrectly select an interferer having the same envelope of the desired signal.

Chapter 4

Distributed Wireless Networks

This chapter introduces the fundamental characteristics of a distributed wireless network, focusing on the impact of multiple antennas on the system behavior. A brief description of the widely diffused IEEE 802.11 standard for WLANs is pro- vided, with particular reference to the medium access control layer. Besides, a short overview of the research literature that analyzes the theoretical aspects re- lated to the adoption of beamforming techniques in Distributed Wireless Networks (DWNs) is presented.

4.1 General concepts

In recent years, there has been an increased interest in the design of DWNs for indoor and outdoor operations, given their self-configuring capabilities and their lower installation cost with respect to the infrastructured networks. DWNs include the well known Mobile Ad-hoc NETworks [55] (MANETs) as well as the lately introduced Wireless Mesh Networks (WMNs) [56], and the application domain involves data, voice and video transmission. WMNs and MANETs are character- ized by the lack of a wired infrastructure, as is required in cellular environment through the deployment of base stations. Besides, both kinds of networks adopt a multi-hop approach. The generic node is able to communicate directly with any other node that resides within its transmission range, but, in order to exchange packets with nodes residing beyond this range, the presence of intermediate re- lays is required to forward the messages hop by hop. Even if many common aspects exist between MANETs and WMNs, some key differences can be highlighted. In a MANET, nodes can be considered substan- tially identical (Fig. 4.1), while, in a WMN, nodes can be classified in two groups: the mesh routers, forming the backbone WMN, and the mesh clients, forming the client WMN (Fig. 4.2). Mesh routers and MANET nodes may be laptops or

57 58 Chapter 4. Distributed Wireless Networks

Figure 4.1: Ad-hoc network.

Personal Digital Assistants (PDAs) with a wireless board, and must have routing capabilities to perform packet forwarding. A mesh router provides multiple virtual or physical interfaces to manage the communications with both the mesh clients and the other mesh routers. Besides, the backbone nodes can be equipped with multiple to increase the available bandwidth resources. However, in this case, co-channel interference remains a limiting factor even if the frequency chan- nels are non-overlapping. Another fundamental difference between MANETs and WMNs is that, in a MANET, nodes are mobile and power saving is mandatory, while in a backbone WMN the nodes have a limited mobility and energy saving is not a fundamental concern. Even if MANETs and WMNs have different constraints in terms of mobility and power saving, a fundamental topic for both kinds of networks is the increase of the network throughput and the improvement of communication reliability. Over the past twenty years, DWNs have been adopted for seamless internetwork- ing in areas without pre-existing communication infrastructures, finding appli- cation in military and disaster recovery environments. However, the recent in- troduction of new standards and technologies, such as Bluetooth [57] and IEEE 802.11 [58], has largely increased the interest of manufacturers and operators for the civil application of distributed networks. The rapid diffusions of wireless de- vices among users, from cell phones to portable laptops, increases the demand 4.2. IEEE 802.11 59

Figure 4.2: Wireless mesh network.

of wireless services in personal, local, campus and metropolitan areas. The de- ployment of WMNs represents a low-cost opportunity to support temporary oc- currences, such as conferences, concerts and sport events, as well as to guarantee permanent services, including enterprise networking, broadband home network- ing, building automation, community networks, etc.

4.2 IEEE 802.11

The most widely adopted standard for DWNs is the IEEE 802.11, which provides detailed specifications for the Medium Access Control (MAC) and the PHYsi- cal (PHY) layers of WLANs. The legacy version, [58], approved in 1997, has been successively extended by different task groups, providing a set of WLAN standards that are globally denoted by the term 802.11x. Some extensions have been developed to increase the available rate [59–61], while other amendments concern Quality of Service (QoS) support [62] and security improvement [63]. Further proposals, regarding the communication in high mobility environment, fast roaming, WMN management and throughput enhancement, are in phase of study or are already present in draft format. The 802.11 legacy version operates at 2.4 GHz and adopts two spread spectrum techniques to transmit the data frames over the medium: the Direct Sequence 60 Chapter 4. Distributed Wireless Networks

Spread Spectrum (DSSS) and the Frequency Hopping Spread Spectrum (FHSS). Together with these RF technologies, the standard provides the possibility to com- municate by InfraRed (IR). However, this option has not been considered in the successive extensions of 802.11 because IR PHY requires LOS and cannot pass through walls, issues which restrict it to small indoor environments.

4.2.1 Transmission rates The nominal bit rates provided by the RF PHY of the legacy 802.11 are 1 and 2 Mbits/s obtained using Binary Phase Shift Keying (BPSK) and Quadrature Phase Shift Keying (QPSK) modulations. The 802.11b amendment provides two additional bit rates equal to 5.5 and 11 Mbits/s, while the 802.11g reaches the 54 Mbits/s employing the Orthogonal Frequency Division Multiplexing (OFDM) technique. The same rates of the 802.11g are available in the 5.8 GHz band by adopting the 802.11a PHY layer extension. Both 802.11a and 802.11g can operate at several bit rates, varying from 6 to 54 Mbits/s, but, since the transmitter power is limited (100 mW in Europe and 1 W in USA), the transmission range decreases when the bit rate increases. The different rates are obtained selecting the proper transmission mode, which is defined by the combination between the modulation scheme and the coding rate of the adopted convolutional encoder. At present, the Task Group n is working on the final version of the 802.11n ex- tension that is expected to be approved in 2009 [26]. This further amendment combines MIMO and OFDM technologies to support nominal rates in the order of 300÷600 Mbits/s, depending on the number of antennas employed at the trans- mitter/receiver sides and on the richness of the scattering environment [64–65].

4.2.2 Architecture The basic element of an 802.11 WLAN is the Basic Service Set (BSS), which represents a set of nodes that communicate with each other. If there is no con- nection to a wired network, the BSS is called Independent BSS (IBSS) and the nodes, which can be mobile, are able to exchange information adopting multi-hop approach. An IBSS is often formed without pre-planning and the wireless connec- tions are maintained for only as long as the WLAN is needed. Therefore, an IBSS is defined as an ad-hoc network. When there is an Access Point (AP), the BSS is called infrastructure BSS. In this case, if a node has to communicate with another node of the same BSS, the communication is sent first to the AP and then from the AP to the destination node. Two BSSs that are too far to communicate directly can be connected by an abstract medium called Distribution System (DS). The DS enables the communications between APs of different BSSs, guarantees the for- warding of frames to mobile nodes moving from a BSS to another, and exchanges 4.2. IEEE 802.11 61 information with the wired network. The union of the DS and of the connected BSSs is called Extended Service Set (ESS). The ESS and all of its mobile nodes appear to all external equipments as a single MAC layer network with physically stationary nodes. The legacy 802.11 does not guarantee the connection to a node exiting from an ESS and entering in another one. This problem is addressed in the 802.11s extension, which defines the procedure for coordinating different ESSs in order to form a WMN. The 802.11 protocol provides two fundamental methods to access the medium: the Distributed Coordination Function (DCF), which manages the communications in ad-hoc networks, and the Point Coordination Function (PCF), which supports the centralized network operations. A temporal structure, called Superframe is subdivided in two periods, the Con- tention Free Period (CFP), in which the PCF operates, and the Contention Pe- riod (CP), in which the DCF does. The beginning and the durations of the CFP and of the CP are decided by a Point Coordinator (PC), usually the AP, and are communicated to all nodes by proper beacon frames. The PCF is useful for time bounded traffic, but consumes much bandwidth, because, for each source- destination communication, two transmissions must be performed (source-AP and AP-destination).

4.2.3 The 802.11 DCF The 802.11 DCF is a random access scheme based on the Carrier Sensing Multiple Access with Collision Avoidance (CSMA/CA) protocol and working on best effort basis for asynchronous data transfer. Two access mechanisms are provided by the DCF: a basic access mechanism and a Request To Send/Clear To Send (RTS/CTS) one.

4.2.3.1 Basic access The basic access is a two way handshaking method in which the correct reception of the DATA packet is communicated to the source by sending an ACKnowledge- ment (ACK) packet. The access procedure can be summarized as follows. A source node having in its buffer a DATA packet ready for transmission mon- itors the channel. At the first transmission attempt, if the channel is sensed idle for a Distributed InterFrame Space (DIFS) time, the node immediately transmits, while, if the channel is sensed busy during the DIFS, the node goes on monitor- ing. When the channel is sensed idle for a DIFS, the source generates a random backoff interval in a discrete time to reduce the collision probability with other competing nodes. The backoff time is given by the product between the slot time σslot and a random integer selected in the interval [0,CWmin − 1], where CWmin 62 Chapter 4. Distributed Wireless Networks is the minimum Contention Window (CW). If the number of contending nodes is high, many nodes monitor the channel and may access immediately once the medium is sensed idle. The random backoff that each node has to wait reduces the probability that two nodes transmit simultaneously. Both σslot and CWmin are specified by the standard and depend on the adopted physical layer technology. In particular, σslot is set equal to the time required by a node to detect the transmis- sion of a packet by any other node. The slot time accounts for the time needed to switch from the receiving to the transmitting state, for the time to signal to the MAC layer the state of the channel and for the propagation delay. The generated backoff time is inserted in a reverse counter that is decremented if the channel persists in the idle state, frozen if the medium is sensed busy and reactivated when the channel is sensed idle for a DIFS or an Extended InterFrame Space (EIFS). In particular, the node waits for a DIFS if no collision has been detected during the busy period, while it waits for an EIFS(>DIFS) if a collision has been detected. When the backoff counter reaches the zero value the packet is transmitted (at the beginning of the corresponding slot time). In order to confirm the correct DATA reception, an ACK is sent back by the des- tination to the source after a Short InterFrame Space (SIFS

4.2.3.2 RTS/CTS access The 802.11 DCF provides an additional four-way handshaking mechanism for packet transmission, called RTS/CTS (Fig. 4.3). In this case a source having a packet awaiting transmission follows the same rules explained above for the basic access, but, instead of the DATA packet, the source preliminarily transmits an RTS packet. If the destination receives the RTS correctly, it responds, after a SIFS, with a CTS packet. The source is allowed to transmit its DATA packet only if the CTS is 4.3. DWNs and advanced antenna techniques 63

Figure 4.3: RTS/CTS access mechanism.

correctly received. RTS and CTS are short frames that carry information regarding the length of the packet to be transmitted. This information can be read by any listening node and exploited to update the Network Allocation Vector (NAV). The NAV is a value that indicates to a node the amount of time that remains before the medium becomes available again. The detection of just one packet among the RTS and the CTS reduces the hidden terminal problem, a phenomenon occurring when a node is hidden from either the source or the destination. The RTS/CTS mechanism is very effective in terms of system performance mainly when large packets are considered. Assuming a perfect channel sensing by each node, a collision may occur only when two or more packets are transmitted within the same slot time. Adopting the basic access for large DATA packets, a collision leads to a considerable waste of time, while, employing the RTS/CTS mechanism, the collision involves only the shorter RTS/CTS packets and so less time is wasted.

4.3 DWNs and advanced antenna techniques

The 802.11 DCF is designed assuming the use of a single antenna at each node, therefore, by using the standard access scheme, a high performance level can- not be guaranteed for the interfered communication. The presence of undesired sources represents a worthy problem to address, because in recent years the level of interference has been considerably increased, especially in the unlicensed In- dustrial, Scientific and Medical (ISM) band (900 MHz, 2.4 GHz and 5.8 GHz), due to the large number of technologies sharing the same frequency range. For example, in the 2.4 GHz band, several standards, such as IEEE 802.11b/g/n, Blue- tooth, IEEE 802.16a and HomeRF, and many devices, such as microwave ovens, have to coexist. Besides, the limited resources of the wireless channel are, in 64 Chapter 4. Distributed Wireless Networks practice, further decreased by the propagation environment that is affected by multipath and fading. These problems, together with the growing demand for supporting higher bit rates, have raised the interest of the research community on multiple antenna techniques. The adoption of multiple antennas is able to provide a large performance improve- ment and so the introduction of MIMO systems at the PHY layer of the 802.11 standard is the objective of the efforts of the Task Group n. However, the complete exploitation of the potential offered by diversity techniques and MIMO systems in high-rank environment, and of fixed and adaptive beamforming in low-rank environment, requires the modification of the 802.11 MAC layer as well as the design of novel and efficient SDMA schemes. Several MAC protocols have been proposed in the literature to exploit the capabilities of multi-antenna technology. These access schemes can be classified according to the characteristics of the an- tenna system adopted at PHY layer that, in turn, depend on the spatial properties of the propagation environment. The diversity approach is considered in [66–70], while 802.11 DCF modifications to support MIMO systems are proposed in [71–75]. In the first case the throughput improvement is obtained by increasing the reliability of the single communication link, while, in the second case, the MAC protocols are designed to support the simultaneous transmission of multiple data streams. This latter approach requires a tradeoff between throughput improvement and interference reduction [71–72]. The large part of the MAC protocols proposed in the literature for DWNs adopt- ing multiple antennas assumes a low-rank environment and is designed to operate with sectorized, switched-beam, directional and adaptive antennas [76–112]. As described in the previous chapter, beamforming techniques increase the SINR at the array output and allow each node of the network to communicate in presence of a larger interference power. To exploit the larger immunity against the unde- sired sources, the access schemes are developed to enable the possibility that dif- ferent node pairs communicate simultaneously. However, the novel mechanisms that can be conceived to reach this objective may generate problems due to the directionality of the communications. The following paragraphs summarize these problems and briefly describe the main proposals for exploiting advanced antenna techniques in DWNs.

4.3.1 MAC layer problems The most common drawbacks that can be encountered in a DWN using fixed and adaptive beamforming are due to hidden and exposed terminals, deafness, muteness and suicide ACK. Some of these problems are already present when the communications are performed in omnidirectional operating mode, while oth- ers appear when the packet exchange is directional. These new problems put 4.3. DWNs and advanced antenna techniques 65

Figure 4.4: Hidden terminal due to unheard RTS.

in evidence that the introduction of advanced antenna systems does not immedi- ately guarantee higher performance, but requires proper optimization techniques at MAC layer.

4.3.1.1 Hidden terminal due to unheard RTS/CTS

In the case the effects due to hidden terminal can be con- siderably mitigated, even if not completely removed, by adopting the RTS/CTS exchange. However, if the packets are not transmitted in omnidirectional operat- ing mode, new kinds of hidden terminal may occur: the hidden terminal due to unheard RTS/CTS and the hidden terminal due to asymmetry of gain [77–78]. A possible scenario in which the first situation may occur is shown in Fig. 4.4. The source S1 is transmitting a DATA packet to the destination D1 in beamform- 1 ing operating mode . Besides, S1 has placed a null towards S2 and D2 to suppress their interference. During the communication between S1 and D1 the destination D2 transmits a CTS packet to S2, which cannot be received by S1 (Fig. 4.4a). If S1 and D1 finish their communication while that between S2 and D2 is still in progress, and if S1 has a packet for another destination D3 (lying in the same di- rection of the pair S2-D2), a collision may occur between the RTS packet sent by S1 and the DATA packet that D2 is trying to receive from S2 (Fig. 4.4b). This phenomenon, called hidden terminal due to unheard RTS/CTS, puts in evi-

1The term “beamforming operating mode” is adopted in this thesis to indicate the use of direc- tional, adaptive, switched-beam and phased-array systems. 66 Chapter 4. Distributed Wireless Networks

Figure 4.5: Hidden terminal due to asymmetry of gain.

dence that the exploitation of the spatial domain using only directional communi- cations may increase the collision probability in certain scenarios.

4.3.1.2 Hidden terminal due to asymmetry of gain

This situation may occur in a DWN when the towards the desired direction in beamforming operating mode and the antenna gain in omnidirectional operating mode are different. In this case, the communication range between two nodes depends on the state of their antenna systems: the distance ddd that can be reached when both nodes operate in a beamforming mode is larger than the distance ddo that can be reached when one node adopts a directional approach and the other operates in omnidirectional mode. This difference may lead to the situation described by Fig. 4.5. The node S2 is in the idle state and senses the channel in omnidirectional operating mode. Therefore, S2 is not able to receive the directional CTS transmitted by do D1 to S1, because the distance between D1 and S2 is larger than d (Fig. 4.5a). While D1 is receiving the DATA packet from S1, a packet for D2 arrives in the transmission buffer of S2. S2 performs a directional carrier sensing in the S1- D1 direction and senses the channel as idle, because the transmission is directed from S1 towards D1. However, when S2 transmits the directional RTS towards D2 a collision occurs because both D1 and S2 are operating in beamforming mode, namely with the highest gain. This scenario shows that two nodes may be out of each other’s range when at least one of the two is idle, but the same nodes may be within range when they are both operating in beamforming mode. 4.3. DWNs and advanced antenna techniques 67

Figure 4.6: Exposed terminal.

4.3.1.3 Exposed terminal The exposed terminal is a typical problem of DWNs that is also present when all communications are performed in omnidirectional operating mode. The main consequence of this phenomenon is an underutilization of the available spatial channel resources. Fig. 4.6 shows a possible scenario involving directional communications. The destination D1 transmits an omnidirectional CTS for the source S1 (Fig. 4.6a). This control packet is also received by the idle node S2, which now knows the duration of the communication and can update its virtual carrier sensing informa- tion. Besides, during the DATA/ACK exchange between S1 and D1, a packet for D2 arrives at the transmission buffer of S2. Exploiting the virtual carrier sensing information, S2 may decide to delay the RTS transmission towards D2 in order to avoid collisions. However, as shown in Fig. 4.6b, the pairs S1-D1 and S2-D2 may send packets simultaneously without destroying the reciprocal communications. In practice, instead of avoiding a collision, the source S2 wastes a transmission opportunity.

4.3.1.4 Deafness A typical drawback due to directional communication in distributed environment is deafness, which occurs when a source tries to send packets to a destination that is already involved in a communication with another node. In Fig. 4.7a the node S1 is sending a DATA packet to D1, while the source S2 is transmitting an omni- directional RTS to inform the neighbors about its intention to send a packet to D2. 68 Chapter 4. Distributed Wireless Networks

Figure 4.7: Deafness.

S1 is unable to hear this RTS that, however, does not destroy the current commu- nication because D1 has placed a null towards S2. When the S1-D1 exchange is finished, deafness may occur if S1 has a packet for S2 in its transmission buffer. In fact, in this case, S1 sends an RTS that cannot be received by S2 (Fig. 4.7b). Besides, S1 is unaware of the ongoing communication between S2 and D2. There- fore, S1 assumes that the lack of the CTS response is due to collisions and goes on transmitting the RTS packet after each failed attempt. This situation may continue until the Retry Limit is reached and so the DATA packet is discarded. The main consequences of deafness are packet losses and an increase of the level of interference, due to the useless transmission of RTS packets, which may inhibit other nodes from accessing the medium.

4.3.1.5 Muteness

Muteness is the inability of a node to transmit due to insufficient information re- garding channel occupation. Assume that the RTS/CTS packets are transmitted in omnidirectional operating mode, while the DATA/ACK exchange is performed in beamforming operating mode (Fig. 4.8a). The destination D2 is in direct ra- dio range of both S1 and D1, while the source S2 has no information about the communication between S1 and D1. On the other hand, S1 and D1 can receive the 4.3. DWNs and advanced antenna techniques 69

Figure 4.8: Muteness.

control packets transmitted by D2. This information allows the source S1 to know exactly when the channel is idle and thus it has a good probability of capturing the medium after each successful packet transmission. Instead, S2 is forced to randomly discover when the communication between S1 and D1 is silent. There- fore, S2 continuously tries to contend for access by sending RTS packets to D2, which usually defers the response because of S1-D1 activity (Fig. 4.8b). Besides, after each unsuccessful attempt, S2 doubles the contention window until its max- imum value and backs off for an exponentially increasing amount of time. This scenario leads to a situation in which the node S1 captures the channel almost continuously, while the node S2, experiencing muteness, can communicate only when an exchange has been completed by S1-D1. The consequences of muteness, which can occur also when all communications are performed in omnidirectional operating mode, are unfairness and waste of resources due to the increased level of interference caused by the continuous transmission of the RTS packets [84].

4.3.1.6 Suicide ACK In many practical scenarios multiple antennas can be more easily deployed on the APs, while technological limitations as well as cost considerations make it more difficult to equip small mobile nodes with advanced antenna systems. Therefore, employing SDMA technique, an AP may be able to simultaneously transmit mul- tiple packets to different mobile nodes that, conversely, adopt an omnidirectional 70 Chapter 4. Distributed Wireless Networks

Figure 4.9: Suicide ACK.

approach. In such a scenario the suicide ACK may occur. As shown in Fig. 4.9, the AP is sending at the same time a DATA packet to the des- tination D1, containing bDATA−D1 bits, and a DATA packet to the destination D2, containing bDATA−D2 bits. In general, the two packets can have different size. In this particular example bDATA−D1 is larger than bDATA−D2 and so the transmission towards D2 finishes when the transmission towards D1 is in progress. According to the 802.11 MAC protocol, D2 sends the ACK to the AP after a SIFS. The ACK is received by the AP, but collides with the packet destined to D1, because D1 is equipped with a unique antenna and is unable to suppress the undesired source. The suicide ACK represents a problem arising when simultaneous uplink and downlink transmissions must be performed. Statistically, the smaller frames have a higher probability of being acknowledged, and so unfairness may arise [76,113].

4.3.2 MAC layer proposals The access schemes designed to support beamforming in DWNs that can be found in literature are usually extensions of the 802.11 DCF. Novel approaches and so- phisticated mechanisms are proposed by the different authors to solve some of the problems just itemized, as well as to increase the throughput of the entire network. 4.3. DWNs and advanced antenna techniques 71

Figure 4.10: Directional NAV.

4.3.2.1 Directional NAV A considerable performance improvement can be reached employing a directional virtual carrier sensing mechanism, called Directional NAV (DNAV), which has been deeply analyzed in [96] and also adopted in the access schemes proposed in [78–79, 81, 87, 95, 111]. The DNAV is associated with a direction, corresponding to the estimated DOA of the received signal, and a width, which depends on the antenna beamwidth (Fig. 4.10). Multiple DNAVs can be set for a node that maintains a unique timer for each DNAV and updates the direction, the width and the expiration time when the physical layer provides newer information regarding the channel occupation in the considered direction. With respect to the omnidirectional NAV used in the 802.11 DCF, the DNAV allows the access scheme to determine direction-specific channel availability, providing more precise information for resource management optimization.

4.3.2.2 Synchronous communications The asynchronous nature of the 802.11 DCF may lead to considerable transmis- sion delays and other phenomena, such as the ACK suicide. To combat these drawbacks, some authors propose the adoption of a partially synchronous ap- proach [76, 91, 100]. The MAC protocol described in [91], specifically designed to reduce the packet delay, is based on a mechanism that maps the spatial channels generated by the 72 Chapter 4. Distributed Wireless Networks antenna system into logical channels. When the mapping procedure is completed, the communications are performed synchronously using proper beacon frames. Each beacon frame provides a certain transmission opportunity that enables a source to transmit for a certain amount of time (burst transmission). In [76] the synchronous approach is adopted to avoid the suicide ACK. The com- munication channel is subdivided in two subchannels. The first one, in which the communications are asynchronous, is used for the omnidirectional RTS/CTS ex- change, while the second subchannel, in which the communications are synchro- nous, is employed for the DATA/ACK exchange. Besides, in the second subchan- nel, both space-division and time-division multiplexing are performed to enable multiple simultaneous synchronized transmissions from the AP to the destination nodes. To avoid the suicide ACK, the ACK packets are transmitted during a slot time in a position that is selected larger than the maximum length of the DATA packet.

4.3.2.3 Tones The use of tones reduces the hidden terminal and the deafness phenomena [80,85]. Tones are essentially sinusoids with sufficient spectral separation that do not con- tain information bits and thus do not require demodulation. They are only detected through energy estimation. To enable the use of tones the channel must be sub- divided in two subchannels: the data channel, where the four way handshake is performed, and the control channel, where the tone is transmitted. The access scheme proposed in [85] has been developed to address hidden termi- nal due to unheard RTS/CTS. In this case the tones are transmitted by the source and the destination on the control channel during the entire duration of the com- munication. A potential hidden terminal, sensing the control channel, is able to detect the ongoing dialogue and avoid transmission. A drawback of this protocol is that, if the tones are transmitted in beamforming operating mode, deafness may occur. The protocol proposed in [80], called ToneDMAC (Fig. 4.11), adopts a directional RTS/CTS exchange to improve spatial reuse and considers the use of tones for specifically addressing deafness. Each tone-frequency identifies a unique node, enabling each neighbor to determine the sender of a given tone. After the di- rectional RTS/CTS exchange, the source and the destination transmit omnidirec- tional out-of-band tones to inform the neighbor that the communication is com- pleted. Besides, from tone reception, a neighbor can deduce that the possible previous failures in contacting the source or the destination were due to deafness and not to network congestion. When this neighbor detects a tone transmitted by its intended destination it sets the backoff counter to zero and generates an- other backoff with the minimum contention window. Differently from [85], in 4.3. DWNs and advanced antenna techniques 73

Figure 4.11: Time line for ToneDMAC protocol.

this case tones need not be transmitted simultaneously during DATA packet trans- mission/reception and so multiple transceivers are not necessary.

4.3.2.4 Multiple RTS packets

The reduction of deafness, exposed terminal and hidden terminal problems require the use of efficient mechanisms to identify the location of the neighbor nodes to- gether with proper algorithms for exploiting the acquired information. To reach these objectives some authors propose the use of multiple directional RTS pack- ets [87, 100]. In [87], the space surrounding each node is subdivided in a certain number of sec- tors that depends on the beamwidth of the radiation pattern generated by the an- tenna system. A source having a data packet ready for transmission sends an RTS packet for each sector. More precisely, the RTS packets are sent in beamform- ing operating mode, consecutively and in a circular way, until the area around the source is completely scanned. Each directional RTS contains a field that speci- fies the sector that will be used during the subsequent DATA transmission and the sector from which the RTS itself is currently transmitted. The generic neighbor inserts this information in a location table, containing the identifier of the node that has been heard, the sector employed by this node, and the sector from which this node is seen. The combined use of the location table and of the DNAV en- ables the neighbor to decide if its intended communication will interfere or not, so reducing the hidden terminal problems due to unheard RTS/CTS and the effects related to the exposed terminal. 74 Chapter 4. Distributed Wireless Networks

4.3.2.5 Longer handshake Some authors introduce new control packets in the handshake to enable spatial multiplexing [105], or to guarantee higher protection against interference [104]. The receiver initiated handshake presented in [105] aims to improve the perfor- mance of the bottleneck nodes by using SDMA. The destination transmits peri- odically an omnidirectional Ready-To-Receive packet that is employed by each neighbor to steer its main lobe towards the destination. The subsequent RTS/CTS negotiation involves the maximum allowed length of the DATA packet. Besides, each RTS packet, transmitted by the generic source, contains the particular train- ing sequence that identifies the source itself and is used by the destination to form the corresponding receiving beam. The employment of different training sequences for different neighbors enables the generation of multiple beams for multiple sources together with the use of successive interference cancellation al- gorithms to distinguish the different packets. A six way handshake is presented in [104] for protecting the DATA packet recep- tion from ongoing and potential future interference. Two further omnidirectional control packets are introduced after the RTS/CTS exchange. These packets are transmitted by all the neighbors having heard the RTS and/or the CTS, and are used by the source and the destination for beamforming operations. More pre- cisely, the destination transmits to the source the training sequence, which, differ- ently from [105], is unique for all the nodes of the network, while the other neigh- bors transmit generic sequences of bits different from the training one. Adopting a temporal reference algorithm the source is able to steer the main lobe towards the destination and to place the nulls towards the neighbors. The same operation is then performed by the destination. In this protocol all transmissions are per- formed in omnidirectional operating mode, while the DATA and ACK receptions are performed in beamforming operating mode. This approach does not exploit the spatial domain at the maximum level, but, assuming a perfect physical carrier sensing, it solves almost completely the deafness and the hidden terminal prob- lems.

4.3.3 Theoretical approaches The MAC protocols proposed in literature are usually developed to increase the network throughput and/or to satisfy specific requirements, but from these par- ticular applications it is difficult to quantify the actual improvement that can be achieved employing advanced antenna systems in DWNs. Besides, a detailed performance analysis becomes more laborious when realistic channel conditions and detailed models for the antenna radiation pattern must be taken into account. Therefore, theoretical models are necessary to investigate from a more general 4.3. DWNs and advanced antenna techniques 75 point of view the potential offered by multi-antenna systems in order to obtain useful criteria that can be applied in MAC protocol design. The milestone for the theoretical studies on the capacity of wireless networks is the paper of Gupta and Kumar [114]. In this work the authors prove that in a multi-hop DWN, where n identical nodes are randomly placed on a planar disk of unit area and each source randomly selects√ the destination, the per-node through- put decreases as a function of O(R/ n log n) under a noninterference protocol, where R is the maximum bit rate of the single node. This scaling law is the con- sequence of the multi-hop nature of DWNs and of the random policy adopted to access the shared medium, which imposes a limitation to the number of simulta- neous transmissions that can be performed at any time. The former characteristic implies that, for each packet generated by a source, a growing number of relay nodes are involved in forwarding the packet to the destination. The fundamental implication of this analysis is the intrinsic limitation in terms of scalability, which generates doubts regarding the feasibility of large DWNs. This issue is deeply studied in [115], where the authors argue that the possibility to design large ad- hoc networks depends on the locality of the traffic patterns. The theoretical analysis presented in [114], is extended in [116] to include the use of advanced antenna systems. The authors show that, using an adaptive array with N antenna elements, the per-node throughput can be increased by a factor N − 2, corresponding to the number of suppressible interferers. Besides, in [117], the same authors present an interesting performance analysis of a directional MAC protocol using realistic antenna radiation patterns. In particular, this study evalu- ates the number of communications that can be simultaneously performed in an ad-hoc network using directional antennas. A further extension of [114] is proposed in [118] to include directional transmis- sions and receptions. In this paper the authors prove that, if the product between the beamwidths of the transmitting/receiving antennas decreases asymptotically as fast as 1/n, large multi-hop DWNs may be feasible. The analysis proposed in [118] states that, from the theoretical point of view, the spatial filtering ca- pabilities of directional antennas may slow down the reduction of the per-node throughput due to the increase of the number of nodes. However, adopting an an- tenna array, narrow beamwidths can be obtained using a large number of antenna elements or increasing the interelement spacing. Therefore, large ad-hoc networks require the employment of cumbersome antenna systems on mobile nodes, which, from a practical perspective, is really difficult to realize. An interesting and somewhat surprising result is obtained in [119], where it is proved that the capacity of an ad-hoc network with a large number of nodes can be increased by exploiting the mobility of the nodes. The authors show that, adopt- ing a proper scheduling policy, delay tolerant applications may benefit from the movement of the relay nodes. The positive effects of mobility on the capacity of 76 Chapter 4. Distributed Wireless Networks wireless networks are confirmed by the model developed in [120], where it is also proved that, when variable-rate transmission is allowed, the capacity increases in presence of time-varying flat fading. Besides, in [120], the authors analyze the benefits derived from the use of multiple antenna systems, showing that succes- sive interference cancellation is more effective when the number of available bit rates is large. A statistical approach for estimating the network capacity in the omnidirectional case is adopted in [121], where the authors employ the pdf of the SINR to charac- terize the per-node throughput in presence of shadowing and fading. The proposed model, useful to analyze the influence of the physical layer parameters on the ca- pacity, shows that the decrease of the path-loss exponent leads to a decrease of the performance, while the particular fading statistic has a small influence. The benefits of directional antennas and DNAV on the throughput of a DWN are analyzed in [122], where authors also investigate the impact of realistic antenna radiation patterns on the IEEE 802.11 DCF. The influence of directional transmis- sion is also studied in [123], where a cross-layer analytical approach including shadowing and fading is described. Original Results

Part II

Advanced Antenna Systems for Distributed Wireless Networks in Low-Rank Environment

Chapter 5

Simultaneous Communications in DWNs Using Adaptive Antenna Arrays

This chapter describes an analytical model for evaluating the number of simul- taneous communications that can be sustained by a distributed wireless network in which the nodes are equipped with adaptive antennas. The presented mathe- matical framework adopts realistic models for the antenna radiation pattern and the channel behavior, and is able to take into account the network topology and the characteristics of the MAC protocol in the spatial domain. The model is em- ployed to investigate the impact of the spatial channel model and of the angular spread on network performance. Besides, the analysis is used to examine how the number of simultaneous communications is influenced by the transmission policy of the control and of the data packets, ruled at MAC layer.1

5.1 Introduction

From the literature overview presented in Subsection 4.3.3, it can be observed that the available theoretical models for the evaluation of the capacity of a DWN using multiple antennas do not include the effects due to the spatial channel char- acteristics. Some studies investigate the impact of Directional Antennas (DAs) on network performance adopting realistic models for the physical layer and the propagation environment [122–123]. However, few papers consider the use of

1The content of this chapter is based on F. Babich, M. Comisso, and L. Manià, “Sustainable Simultaneous Communications in Ad-Hoc Networks Using Smart Antenna Systems,” ACM Wire- less Networks, accepted for publication [172,180].

81 82 Chapter 5. Simultaneous Communications in DWNs Using Adaptive Antenna Arrays

AAs from a pure analytical point of view [116, 120], while taking into account detailed models for the antenna radiation patterns and the network topology. The objective of this chapter is to present a mathematical framework for the esti- mation of the potential offered by smart antennas to increase the network utiliza- tion in a realistic low-rank environment. The proposed method may be used to assess and compare the limiting performance of different antenna systems and ac- cess schemes. The analysis takes into consideration the antenna radiation pattern, the network topology, the spatial channel model, the channel angular spread and the characteristics of the access scheme in the spatial domain. The main goal is the investigation of the impact of the transmission policy of the packets, ruled at MAC layer, on network performance.

5.2 Definitions and assumptions

The analyzed scenario is a DWN with n identical nodes equipped with AAs. The area occupied by the entire network is a circle of radius Rt, where a generic source S selects a destination D among the nodes inside its coverage range Rc (single- 2 2 hop scenario). The topology area Lt = πRt is chosen larger than Lc = πRc in order to take into account the total interference received by D from all the nodes belonging to the network. The analytical model presented in this chapter is used to derive the number of sustainable links of a DWN, Lmax, which is intended as the maximum number of couples of nodes that can communicate at the same time in the area Lc. The number of sustainable links, being related to the area defined by coverage range, and not by the area of the entire topology, can be viewed, in a geometrical sense, as a sort of density of communications in a cell of area Lc. This density is influenced by the antenna gains and by the channel angular spread as well as by the position of the nodes. In particular, Lmax provides an ideal information regarding the potential offered by adaptive arrays in a distributed environment. The number of sustainable links is derived with the specific purpose to obtain a quantity accounting for all elements present in the spatial domain, but not depen- dent on the time details of the scheduler. This approach allows to investigate the achievable performance without the constraints that are unavoidable when a spe- cific backoff mechanism is adopted. As it will be shown in Chapter 6, more specific investigations can be performed employing Lmax in order to analyze the influence of other elements of the com- munication system, such as the modulation scheme and the channel coding tech- nique. Besides, the ideality introduced assuming the maximization of the number of simultaneous communications, which presupposes a perfect scheduling, can be successively removed and the details of a realistic scheduling policy can be 5.2. Definitions and assumptions 83 added to the model. As a result, the classic performance figures, such as the suc- cessful packet delay, the aggregate throughput and the drop probability, can be consequently obtained once the number of sustainable links is established. This analysis will be performed in Chapter 7, investigating the behavior of an 802.11 network in multi-hop environment.

5.2.1 MAC layer assumptions

Following most of the access schemes proposed in literature, it is assumed that the MAC layer employs the RTS/CTS/DATA/ACK access mechanism to manage node communications [76–106, 111–112]. This choice provides more robustness against the hidden terminal and the deafness phenomena (not considered in this study). Even if the basic access can also be modified to include smart anten- nas [110], the RTS/CTS access guarantees that a larger quantity of position infor- mation is available at each node [124]. The presented analytical model is developed assuming that each node (always) uses its adaptive array in reception, but no assumption is made for the transmis- sion policy of the DATA packet, which can be smart or directional. Moreover, no assumption is made for the transmission of the CTS packet, which can be performed in omnidirectional operating mode (OCTS) or in the directional one (DCTS). An effective use of AAs requires the knowledge of the positions of S and of each interferer I in order to perform the beam steering towards the de- sired direction and the null steering towards the undesired ones. This information can be acquired using DOA estimation algorithms, as in [110], or, in presence of multipath, the required radiation patterns can be created employing temporal ref- erence techniques with proper training sequences [104,112]. The availability of these features allows one to assume that the destination D be able to distinguish between the position of the source S and the position of each interferer I. The updating of the radiation patterns is obtained at a cost of a higher overhead that, however, does not influence the number of sustainable links, which is independent of the length of the headers.

5.2.2 PHY layer assumptions

At physical layer, the parameterized ground model for the path-loss attenuation is described by (2.1), where the transmission power Ptx is considered equal for all sources. Multipath will be added to the model in the next section. The coverage range of a node is obtained fixing the noise power W and imposing that, in absence of interference, the SINR at antenna system output be equal to a 84 Chapter 5. Simultaneous Communications in DWNs Using Adaptive Antenna Arrays

threshold SINRth. Therefore, W and Rc are related by:

Ptxγα · 1 · 1 W = α , (5.1) SINRthRc where, being the maximum of the transmitter/receiver radiation pattern steered in the desired direction, the normalized gains are equal to one. From (5.1), it immediately follows that:

µ ¶ 1 α Ptxγα Rc = . (5.2) SINRthW The choice of an ON/OFF criterion to establish packet reception represents a sim- ple method to distinguish successful and unsuccessful transmissions that main- tains the analytical tractability of the model [104, 125–126].

5.3 Multipath model and equivalent gains

As described in Chapter 2, in a multipath scenario each signal replica reaches the receiver with different amplitude, phase, delay and DOA. In particular, in the azimuth domain, the PAS and the angular spread are used to characterize the channel. The pdf of the DOAs, %DOA(ϕ), can be simply obtained normalizing the PAS to the power received from all multipath components:

Pϕ(ϕ) %DOA(ϕ) = , (5.3) Prx 2 and σˆϕ can be viewed as the variance of the normalized PAS. The analytical ex- pressions of the statistical distributions considered in this study for ϕ0 = 0 are summarized in Table 5.1 and the corresponding graphs are plotted in Fig. 5.1. The adopted smart antenna system is a UCA of N omnidirectional antenna el- ements, where the distance between two adjacent radiators is selected equal to half wavelength. The synthesis that provides the array weight vector w is per- formed using the unconstrained LMS algorithm with a training sequence of 512 bits. Besides, this reference power gain pattern is relative to a scenario in which N − 2 interferers are uniformly placed in the azimuth plane. Using the notation described in Section 1.3, the generated power gain pattern is expressed as: ¯ ¯ ¯XN ¯2 ¯ j 2π ρ cos(ϕ−ξ )¯ G(ϕ) = ¯ w e λ c k ¯ , (5.8) ¯ k ¯ k=1 and is considered normalized with respect to its maximum. In presence of mul- tipath the increase of σˆϕ causes a decrease of the spatial correlation between the 5.3. Multipath model and equivalent gains 85

% (ϕ)  DOA Truncated ϕ2  γ − 2 √ G e 2ˆσϕ |ϕ| ≤ π/2 Gaussian 2πσˆ . (5.4)  ϕ [20] 0 elsewhere  √ 2 2 Ring of  cos ϕ− sin γm −sin ϕ √ 1 2 2 |ϕ| < γm1 scatterers π sin γm −sin ϕ . (5.5)  1 [21] 0 elsewhere ( √ Disk of 2 2 2 cos ϕ sin γm2 −sin ϕ 2 |ϕ| ≤ γm2 scatterers π sin γm2 . (5.6) [22] 0 elsewhere √ ( 2|ϕ| Truncated γ − √ L e σˆϕ |ϕ| ≤ π/2 Laplacian 2ˆσϕ . (5.7) [23] 0 elsewhere

TABLE 5.1: NORMALIZED PAS OF THE DIFFERENT CHANNEL MODELS. signal replicas. By consequence, in the radiation pattern, the main lobe cannot be precisely steered and the nulls cannot be precisely placed. To account for these phenomena, the real power gain pattern G(ϕ) is substituted by the function:

Z 2π 0 0 0 FD(ϕ) , G(ϕ )%DOA(ϕ − ϕ)dϕ , (5.9) 0 obtained from combining the normalized power gain pattern in absence of mul- tipath with the DOA statistic. The physical meaning of FD(ϕ), which in the fol- lowing will be called the equivalent power gain pattern, derives from the fact that each signal replica incoming from direction ϕ0 has a fraction of energy (described by the normalized PAS) that is weighted by the corresponding value of gain in the 0 same direction, represented by G(ϕ ). The function FD(ϕ) is useful to model the fact that a signal replica incoming from an undesired LOS direction ϕ is received with the gain corresponding to the null, but other replicas of the same signal, in- coming from ϕ0 6= ϕ, are received with higher gains. Similar arguments hold for the case where ϕ represents a desired direction. The equivalent power gain pattern can be employed to define the average equiva- lent power gains in presence of multipath. In general, the gain in a null, Gn, in a real smart antenna system is not zero and depends on the number of interferers, the physical antenna system, the length of the training sequence, etc. In this study the Gn value is statistically evaluated running Nar = 2000 adaptive routines, where the position of the interferers is randomly generated in each realization. In partic- n ular, Gn is calculated as the average value of gain in each null ϕl (corresponding 86 Chapter 5. Simultaneous Communications in DWNs Using Adaptive Antenna Arrays

%DOA( ϕ )

4

3

2

1 σˆϕ γ γ m 2 m1 0 −40 −30 −20 −10 0 10 20 30 40 ϕ (o)

o Figure 5.1: Normalized PAS of the different channel models for σˆϕ = 10 . Truncated Gaussian [20] Ring of scatterers [21] Disk of scatterers [22] Truncated Laplacian [23] to the l-th interferer) for all the realizations Gl0 (ϕ) and for all the nulls: Z XNar NX−2 2π 1 l0 0 0 n 0 Gn = G (ϕ )%DOA(ϕ − ϕl )dϕ . (5.10) Nar(N − 2) l0=1 l=1 0

It is also useful to define the average values of FD(ϕ) in [0, 2π]: Z 1 2π Gm = FD(ϕ)dϕ, (5.11) 2π 0 and outside the FNBW of G(ϕ):

Z 2π−ϕFN/2 0 1 Gm = FN FD(ϕ)dϕ. (5.12) 2π − ϕ ϕFN/2

Observing that the transmission pattern is updated using the information acquired during packet reception, (5.10)-(5.12) can be considered not only as average re- ceiving gains, but also as average transmission gains. Accordingly, the gains in the desired direction, assumed equal to 0o without loss of generality, are evaluated 5.4. Interference model 87

Figure 5.2: Interference regions. as:

Z 2π 0 0 0 o Gtxd = Grxd = Gd = G(ϕ )%DOA(ϕ )dϕ = FD(ϕ = 0 ), (5.13) 0

where Gtxd is the transmitting gain of the source S towards the destination D and

Grxd is the receiving gain of D towards S. In the following the transmitting and the receiving equivalent gains in the desired direction will be considered as equal. It is worth noting that the scenario corresponding to absence of multipath can be D D derived, as a particular case, choosing %DOA(ϕ) = δ (ϕ), where δ (ϕ) is the Dirac delta function.

5.4 Interference model

This section introduces the interference model for a generic destination node D during the reception of a DATA packet, by adopting the hypotheses and the defin- itions described in the previous sections. The space surrounding D is subdivided into three regions, the region of insup- pressible interference, R1, the region of suppressible interference, R2, the region of no interference, R3 [117]. These regions are identified by three radial distances, Rt, RH(ϕ) and RL(ϕ) (Fig. 5.2). In order to improve the readability of the fig- ure, the Rt value used in the plot is much smaller than its real value and only the regions relative to a single destination D are shown. When the CTS packet is transmitted in omnidirectional operating mode, RH(ϕ) describes a circumference of radius Rc, while, when the CTS packet is transmitted in beamforming oper- ating mode (DCTS case), RH(ϕ) depends on FD(ϕ) (this case is depicted in the figure). The equivalent pattern FD(ϕ), defined in (5.9), is calculated using the 88 Chapter 5. Simultaneous Communications in DWNs Using Adaptive Antenna Arrays radiation pattern G(ϕ), which is created by the smart antenna system of D during the reception of the RTS packet from S and which is used to receive the DATA packet. The real pattern and hence the equivalent one are strictly dependent on the position of the closer interferers. In R1 (region of insuppressible interference) a node is too far from D to correctly receive the CTS packet and does not have useful information to reduce its trans- mitting gain Gtx1 towards D. Therefore, these nodes can interfere both with the main and the minor lobes (direct interference). A node in R2 (region of sup- pressible interference) is able to receive correctly the CTS and is aware of the communication of D. If the MAC protocol provides a protection mechanism, this node can reduce the interference towards D by controlling its transmission gain

Gtx2 in D’s direction. This objective can be obtained, for example, placing a null towards D or employing the DNAV. The nodes inside the region defined by RL(ϕ) are considered not active because they are too close to D and their traffic is con- sidered blocked by the physical CS. The region of no interference R3 is the union of the area covered by RL(ϕ) and of the area outside Rt, which represents the region outside the topology where nodes are not present. The function RH(ϕ) depends on Rc and on the equivalent pattern of D during the transmission of the CTS. Therefore, RH(ϕ) is determined by the effectiveness of

D in protecting its own reception. The range RL(ϕ) is also a function of Gtx2 , so it is influenced by the effectiveness of the generic I in protecting D’s reception. By consequence, RL(ϕ) and RH(ϕ) depend not only on the characteristics of the channel and of the antenna system, defined at physical layer, but also on the way of employing the antenna system, ruled at MAC layer. According to the adopted channel model, the interference received by D from each of the three regions in presence of multipath can be calculated as a function of the number of sustainable links as:

Z 2π Z Rt PtxγαGtx1 Pint1 = α FD(ϕ)˜%act(r, ϕ)rdrdϕ, (5.14a) 0 R (ϕ) r Z Z H 2π RH(ϕ) P γ G tx α tx2 ˜ Pint2 = α FD(ϕ, Lmax)˜%act(r, ϕ)rdrdϕ, (5.14b) 0 RL(ϕ) r

Pint3 = 0, (5.14c)

where %˜act(r, ϕ) is the active node density, which is a function of the spatial distribution of the nodes, and:   (N − 2)Gn + FD(ϕ)(2Lmax − N) N  Lmax ≥  2Lmax − 2 2 F˜ (ϕ, L ) = . (5.15) D max   N  G L < n max 2 5.5. Sustainable links 89

The power Pint1 is evaluated using (2.1) and considering that D and I (in R1) can interfere with any equivalent gain FD(ϕ). The power Pint3 is calculated observing that no interference incomes from region R3. The power Pint2 , instead, must be determined taking into account the smart antenna system characteristics, the SINR requirements at the receiver and the channel conditions. This leads to a more complex expression. The destination D can detect the undesired sources in R2 and, moreover, these sources are aware of the presence of D. By consequence,

Pint2 , in (5.14b), is calculated taking into account that the smart antenna system can place a maximum of N − 2 nulls towards the undesired sources, but, in some scenarios, this potential may be not completely exploited because of bad channel ˜ conditions or too stringent requirements on the SINR. Function FD(ϕ, Lmax) takes into account this difference. Even if N − 2 degrees of freedom are available, the number of communicating nodes in the region R2 may be higher, equal or lower than N − 2. Therefore, the unknown Lmax must be evaluated distinguishing between two different cases: high number of sustainable links (Lmax ≥ N/2) and low number of sustainable links (Lmax < N/2).

5.5 Sustainable links

5.5.1 High number of sustainable links This subsection evaluates the number of sustainable links of the network when Lmax ≥ N/2. In this case, as stated by (5.15), N − 2 directions of interference are received with an equivalent gain equal to Gn << 1, but the other directions of interference, in general, cannot be suppressed and may be received with any gain. In the sole region R2, the communicating nodes can be distinguished between suppressed interferers and not suppressed (but “tolerable”) interferers. Assuming that the network can sustain Lmax simultaneous communications in the area Lc, there are 2Lmax active nodes in R2. These 2Lmax active nodes include D and its source S, therefore the number of active interferers is 2Lmax −2 and the number of unsuppressed interferers in R2 becomes equal to 2Lmax−2−(N−2) = 2Lmax−N. By consequence, for Lmax ≥ N/2, (5.14b) becomes implicitly defined by the number of sustainable links Lmax (still unknown). The active node density, in (5.14), is given by:

%˜act(r, ϕ) = ntx%TOP(r, ϕ), (5.16) corresponding to the product between the number of transmitting nodes (namely active nodes) in the network and the pdf of the spatial distribution of the nodes around D, defined as %TOP(r, ϕ). This pdf is related to the network topology and, 90 Chapter 5. Simultaneous Communications in DWNs Using Adaptive Antenna Arrays for calculation purposes, is rewritten in this form:  F (r, ϕ) r ∈ [0,R ], ϕ ∈ [0, 2π] 1  T t % (r, ϕ) = , (5.17) TOP πR2  t 0 elsewhere R R 2π Rt 2 where 0 0 FT(r, ϕ)rdrdϕ = πRt . In the following, FT(r, ϕ) will be called the topology function. Using (5.14)-(5.17) for Lmax ≥ N/2 and performing some algebra, the total power received by D from all the undesired sources can be eval- uated as: X3 n P γ P = P = tx tx α I, (5.18) int inti πR2 i=1 t where:

(N − 2)GnGtx2 Gtx2 (2Lmax − N) I = I(Lmax) = Gtx1 χ1 + χ2 + χ3, (5.19) 2(Lmax − 1) 2(Lmax − 1) and:

Z 2π Z Rt FD(ϕ) χ1 = α−1 FT(r, ϕ)drdϕ, (5.20a) 0 R (ϕ) r Z Z H 2π RH(ϕ) FT(r, ϕ) χ2 = α−1 drdϕ, (5.20b) 0 R (ϕ) r Z Z L 2π RH(ϕ) FD(ϕ) χ3 = α−1 FT(r, ϕ)drdϕ. (5.20c) 0 RL(ϕ) r

Defining as %SOU(r, ϕ) the pdf of the sources around D in the area Lc, the average distance between S and D can be calculated as:

Z Rc

Rsd = %SOUr (r)rdr, (5.21) 0 where: Z 2π

%SOUr (r) = r %SOU(r, ϕ)dϕ, (5.22) 0 is the marginal of %SOU(r, ϕ) with respect to r. It is worth to remark that, in this chapter, the objective is to calculate the number of one-hop communications that can be performed simultaneously, regardless of the fact that these communications concern packet forwarding or packet delivery. The multi-hop scenario will be introduced in Chapter 7, once the single-hop behavior of the network has been 5.5. Sustainable links 91 established. From (2.1), the desired signal power can be evaluated as: 2 PtxγαGtxd Grxd PtxγαGd Pdes = α = α , (5.23) Rsd Rsd where Gd is defined in (5.13). By consequence, using (5.18) and (5.23), the SINR at the antenna system output can be calculated as: 2 Pdes PtxγαGd SINRout = = " #, (5.24) Pint + W n α tx Rsd 2PtxγαI(Lmax) + W πRt where W is given by (5.1). Defining the maximum number of nodes that can simultaneously transmit in the entire network (while maintaining the output SINR max max above the SINR threshold) as ntx , the number of sustainable links and ntx are related by: max 2 ntx πRc Lmax = 2 , (5.25) πRt 2 according to the definition of Lmax given in Section 5.2. Adopting the ON/OFF criterion to establish packet reception, the DATA packet is considered received by D if SINRout is higher than SINRth. By consequence, using (5.1) and (5.25), equation (5.24) can be rewritten as: 2 Gd SINRth = " #, (5.26) 2L ·I 1 α max Rsd 2 + α πRc SINRthRc from which, by (5.19), a simple quadratic equation is obtained: 2 Lmax + c1Lmax + c2 = 0, (5.27) where the coefficients c1 and c2 are:

α α−2 α α 2 SINRthRsdRc {Gtx2 [(N −2)Gnχ2 − Nχ3]−2Gtx1 χ1}+π(Rsd−Rc Gd) c1 = α α−2 , 2SINRthRsdRc (Gtx1 χ1 + Gtx2 χ3) (5.28a)

α 2 α π(Rc Gd − Rsd) c2 = α α−2 . (5.28b) 2SINRthRsdRc (Gtx1 χ1 + Gtx2 χ3)

The largest root of (5.27) represents the number of simultaneous communications sustainable by the network in the area Lc when Lmax ≥ N/2. 92 Chapter 5. Simultaneous Communications in DWNs Using Adaptive Antenna Arrays

5.5.2 Low number of sustainable links As described in Section 5.4, it may happen that the number of suppressible inter- ferers becomes lower than the available degrees of freedom, N −2, of the physical antenna system (Lmax < N/2). In this case, even if N − 2 degrees of freedom are theoretically available, their actual number is lower and becomes substantially equal to 2Lmax − 2. Therefore, in the region R2, there are no “tolerable” interfer- ers and the 2Lmax − 2 actual degrees of freedom are used to suppress 2Lmax − 2 ˜ interferers, leading to FD(ϕ, Lmax) = Gn, as stated by (5.15). Therefore, using (5.14b) for Lmax < N/2, the interference incoming from R2 becomes: Z Z 2π RH(ϕ) PtxγαGtx2 Pint2 = α Gn%˜act(r, ϕ)rdrdϕ. (5.29) 0 RL(ϕ) r By consequence, (5.19) can be simplified as:

I = Gtx1 χ1 + GnGtx2 χ2, (5.30) and becomes independent of Lmax. Substituting (5.30) in (5.26), the number of sustainable links for Lmax < N/2 can be calculated as: α 2 α π(Rc Gd − Rsd) Lmax = α α−2 . (5.31) 2SINRthRsdRc (Gtx1 χ1 + GnGtx2 χ2) The expression defined in (5.31) represents the complementary case with respect to Lmax ≥ N/2.

5.6 Topology and access scheme

This section analyzes the dependence of Lmax on the MAC protocol characteristics in the spatial domain for a uniform distribution of the nodes and for a random distribution of the nodes.

5.6.1 Uniform distribution The uniform distribution of the nodes in the network, described by the pdf:   1  2 r ∈ [0,Rt], ϕ ∈ [0, 2π] %u (r, ϕ) = πRt , (5.32) TOP   0 elsewhere is analyzed first, since it leads to a more tractable derivation and is widely em- ployed in many theoretical studies [117, 127]. 5.6. Topology and access scheme 93

5.6.1.1 Omnidirectional CTS (OCTS) The access scheme, as stated in Section 5.4, influences the radii that limit the three interference regions and the transmission gains towards D of the nodes lying in these regions. Using an omnidirectional CTS transmission RH(ϕ) describes a circumference of radius Rc, while RL(ϕ) can be derived from:

PtxγαGtx2 FD(ϕ) Pth = α , (5.33) RL(ϕ) where Pth = W · SINRth is the receiving power threshold. Inverting (5.33) and using (5.2), the lower bound of R2 can be easily obtained, and the two required radii can be written as:

RH(ϕ) = Rc, (5.34a) 1 α RL(ϕ) = Rc[Gtx2 FD(ϕ)] . (5.34b)

Considering that for a uniform distribution of the nodes FT(r, ϕ) = 1 in the entire azimuth plane and using (5.34), by simple calculations, (5.20) can be rewritten as: Z 2π ¯ χ1 = KK FD(ϕ)dϕ, (5.35a) 0 Z 2π ¯ α1 χ2 = K {[Gtx2 FD(ϕ)] − 1} dϕ, (5.35b) 0 Z 2π ¯ α1 χ3 = K {[Gtx2 FD(ϕ)] − 1} FD(ϕ)dϕ, (5.35c) 0 where: µ ¶ R α−2 K = 1 − c , (5.36a) Rt ¯ 1 K = α−2 , (5.36b) (α − 2)Rc 2 − α α = . (5.36c) 1 α

The transmission gain Gtx1 , due to the nodes that are too far from D to receive the CTS, does not depend on the MAC protocol characteristics in the spatial domain.

Instead, Gtx2 is influenced by the policy ruled at MAC layer for the transmission of the DATA packet. Therefore, during D’s reception of its own DATA packet, the equivalent transmission gains of the interferers towards D are defined as: G = G , (5.37a) tx1 m  Gm DD G = G0 DD(DNAV) , (5.37b) tx2  m Gn SD 94 Chapter 5. Simultaneous Communications in DWNs Using Adaptive Antenna Arrays

where DD, DD(DNAV) and SD stand for Directional (without DNAV), Direc- tional with DNAV and Smart DATA transmission, respectively. The gains Gm, 0 Gm, Gn are defined in (5.11), (5.12) and (5.10), respectively. In the DD case no protection is guaranteed and any lobe can be directed towards D. In the DD(DNAV) case the access scheme inhibits the nodes in region R2 to steer their main lobes towards D. Therefore, only the minor lobes can be directed towards the destination. In the SD case the MAC policy states that the nodes in R2 have to place a null towards D to protect its communication.

5.6.1.2 Directional CTS (DCTS) When the MAC protocol adopts a directional CTS transmission, the radii that limit the three regions can be evaluated as:

1 RH(ϕ) = Rc[FD(ϕ)] α , (5.38a) 1 α RL(ϕ) = Rc[Gtx2 FD(ϕ)] . (5.38b)

Performing some calculations, (5.20) can be rewritten as:

Z 2π ¯ α1 χ1 = K {[FD(ϕ)] + K − 1} FD(ϕ)dϕ, (5.39a) 0 Z ¡ ¢ 2π ¯ α1 α1 χ2 = K Gtx2 − 1 [FD(ϕ)] dϕ, (5.39b) Z0 ¡ ¢ 2π ¯ α1 α2 χ3 = K Gtx2 − 1 [FD(ϕ)] dϕ, (5.39c) 0 where: 2 α = , (5.40) 2 α and the possible values of Gtx1 and Gtx2 can still be described by (5.37), accord- ing to the transmission policy ruled at MAC layer.

In a scenario where the nodes are uniformly distributed in the topology area, it is intuitive to assume the same distribution for the sources inside the region cov- ered by Rc, therefore:   1  2 r ∈ [0,Rc], ϕ ∈ [0, 2π] %u (r, ϕ) = πRc , (5.41) SOU   0 elsewhere 5.6. Topology and access scheme 95 and, using (5.21) and (5.22), the average distance between the source and the destination becomes equal to 2Rc/3. It is worth noticing that, in the presented model, the pdf %TOP(r, ϕ), and so the function FT(r, ϕ), describe the topology as it is viewed by D. Assuming this pdf as uniform in the area covered by Rt, the marginals with respect to r and ϕ can u 2 u be calculated as %TOPr (r) = 2r/Rt and %TOPϕ (ϕ) = 1/2π, respectively [121]. In terms of distance, as r gets lower the probability that an interferer is closer to D gets lower. Therefore, the use of a uniform distribution for %TOP(r, ϕ) implies that the interferers lie at a larger distance with a higher probability. This assumption may lead to optimistic results with respect to the real behavior of a distributed wireless network.

5.6.2 Random distribution

In phase of simulation, usually, the random position of the nodes is generated using two uniform distributions for the cartesian coordinates or for the polar coor- dinates. However, if the number of interferers is not sufficiently high, this choice does not lead to a uniform distribution of the nodes in the topology area. To model the behavior of a random network, it is proposed to use the following pdf:   1  r ∈ [0,Rt], ϕ ∈ [0, 2π] %r (r, ϕ) = 2πRtr , (5.42) TOP   0 elsewhere

which leads to the topology function FT(r, ϕ) = Rt/(2r). It can be noticed that, considering a finite number of nodes in the network, this pdf provides more re- alistic results with respect to a uniform distribution in the area Lt. In fact, the uniform pdf is more suitable to model network scenarios in which the total num- ber of nodes can be assumed very large, and so a direct relationship can be es- tablished between area and interference. Instead, considering a scenario in which the number of nodes in the region R2 and the number of antennas are of the same order of magnitude (finite and not very large), the distance of each single in- terferer from the destination becomes significant. The two marginals of (5.42), r r %TOPr (r) = 1/Rt and %TOPϕ (ϕ) = 1/2π, are both uniform, and so the probabil- ity that an interferer lies at distance r from D is independent of r. Inserting this topology function in (5.20), and using (5.34) and (5.38) to calculate the radii in the OCTS and in the DCTS cases, respectively, two sets of expressions are obtained. These expressions are formally equal to (5.35) and (5.39), except for the values of 96 Chapter 5. Simultaneous Communications in DWNs Using Adaptive Antenna Arrays the constants that become: µ ¶ R α−1 K = 1 − c , (5.43a) Rt ¯ Rt K = α−1 , (5.43b) 2(α − 1)Rc 1 − α α = , (5.43c) 1 α 1 α = . (5.43d) 2 α According to the distribution of the interferers around D, the pdf of the sources is selected as:   1  r ∈ [0,Rc], ϕ ∈ [0, 2π] %r (r, ϕ) = 2πRcr , (5.44) SOU   0 elsewhere and so, using (5.21) and (5.22), Rsd = Rc/2.

5.6.3 Refinement for Smart DATA transmission

The choice of the transmission gain of the nodes in R2, as stated in (5.37b), is acceptable for the cases of directional DATA transmission with and without

DNAV. In the smart DATA transmission cases, instead, the choice of Gtx2 = Gn is correct when the number of sustainable links is low (Lmax < N/2), but may lead to an overestimation of Lmax when the number of sustainable links is high (Lmax ≥ N/2). In general, it is not true that all interferers in R2 are able to place a null towards D. If the number of communicating nodes in the area Lc is larger than N − 2, some nodes will necessarily interfere with a gain larger than Gn to- wards other nodes. By consequence, the assumption Gtx2 = Gn is too optimistic for Lmax ≥ N/2. To analyze this scenario, the same arguments described in Section 5.4 can be em- ployed. In particular, in the SD cases, the gain Gtx2 must be substituted by:  0  (N − 2)Gn + (2Lmax − N)Gm N  Lmax ≥  2(Lmax − 1) 2

Gtx2 =Gtx2 (Lmax)= , (5.45)   N  G L < n max 2 where, thanks to the use of the DNAV, the transmission gain towards the directions 0 that cannot be suppressed is given by the average gain outside the main lobe Gm, 5.7. Results 97

expressed by (5.12). Inserting (5.45) for Lmax ≥ N/2 in (5.28) and (5.35) for the OCTS case (or (5.39) for the DCTS case), equation (5.27) becomes a nonlinear equation in the unknown Lmax that can be numerically solved. For example, for α = 4, one can obtain a sixth degree equation for a uniform distribution of nodes, or a twelfth degree equation, for the random distribution described by the pdf in (5.42). The mathematical details regarding the uniform distribution are reported in the Appendix. To avoid cumbersome calculations, an iterative approach can be used to obtain more precise values in the SD cases for Lmax ≥ N/2. The proposed itera- tive procedure begins from the overestimated value of the number of sustainable links, defined as Lmax(0) and provided by the analytical model using the gain

Gtx2 (i = 0) = Gn. At the first step, a new gain Gtx2 (1) is derived using (5.45) for Lmax ≥ N/2 with Lmax = Lmax(0). If Lmax(0) is not an overestimation of the real Lmax value, then Gtx2 (1) should be equal to Gtx2 (0). If not, this means that the transmission gain used to calculate the number of sustainable links is not sufficiently realistic and must be recalculated. In general, the gain Gtx2 (i + 1), at the (i + 1)-th iteration, is evaluated as:

0 (N − 2)Gn + [2Lmax(i) − N]Gm Gtx2 (i + 1) = , (5.46) 2[Lmax(i) − 1] using the number of sustainable links computed at the i-th iteration, Lmax(i). This new gain is then inserted in the analytical model involving the second degree equation to compute the new value Lmax(i + 1) and so on. The iterative procedure is terminated at step i = i0 when |Lmax(i0 + 1) − Lmax(i0)| < $SD, where the −3 threshold value $SD is set equal to 10 . It can be noticed that the behavior of

Gtx2 (i) is not monotonous and, for some steps, it can be larger than its exact value, leading to estimations Lmax(i) lower than the real number of sustainable links. However, the process converges to an accurate value in a small number of steps. A validation of this iterative approach will be performed in Section 5.8.

5.7 Results

The most relevant results obtained using the described model are presented in this section. All curves are derived adopting a coverage range Rc equal to 100 m and assuming Rt >> Rc. The receiving threshold SINRth is chosen equal to 10 dB, a suitable value for many communication systems. A more detailed investigation regarding the choice of the threshold in agreement with the modulation scheme, the channel coding technique, the size of the packet and the packet error rate will be performed in the next chapter. 98 Chapter 5. Simultaneous Communications in DWNs Using Adaptive Antenna Arrays

12

11

10

9

8

7

6 max

L 5

4

3

2

1

2 4 6 8 10 12 14 16 N

Figure 5.3: Sustainable links as a function of the number of antennas for a uniform o distribution of the nodes in absence of multipath (σˆϕ = 0 ). ♦ OCTS-SD ♦ DCTS-SD ∗ OCTS-DD(DNAV) ∗ DCTS-DD(DNAV) ◦ OCTS-DD ◦ DCTS-DD

5.7.1 Packet transmission policy The influence of the MAC protocol characteristics in the spatial domain on the number of sustainable links can be inferred from Figg. 5.3-5.6, which are ob- tained choosing α = 4 and the GBSBM channel model, corresponding to the disk of scatterers pdf, to account for the azimuth spread of the channel [22]. Fig. 5.3 shows the number of sustainable links in absence of multipath for a uni- form distribution of the nodes and of the sources. The best performance can be reached when adaptive arrays are used not only in reception, but also in transmis- sion and in conjunction with the omnidirectional CTS. The use of a directional NAV reduces the direct interference and increases the performance of the direc- tional transmission mainly in the OCTS case. In the DCTS case, instead, the virtual carrier sensing mechanism seems less effective because little position in- formation is available and so a lower number of nodes is aware of the ongoing communications. 5.7. Results 99

a) b) 12 12 11 11 10 10 9 9 8 8 7 7 6 6 max max

L 5 L 5 4 4 3 3 2 2 1 1

2 4 6 8 10 12 14 16 2 4 6 8 10 12 14 16 N N

c) d) 12 12 11 11 10 10 9 9 8 8 7 7 6 6 max max

L 5 L 5 4 4 3 3 2 2 1 1

2 4 6 8 10 12 14 16 2 4 6 8 10 12 14 16 N N

Figure 5.4: Sustainable links as a function of the number of antennas for a uniform distribution of the nodes and using the disk of scatterers pdf: o o o o a) σˆϕ = 1 , b) σˆϕ = 3 , c) σˆϕ = 5 , d) σˆϕ = 10 . ♦ OCTS-SD ♦ DCTS-SD ∗ OCTS-DD(DNAV) ∗ DCTS-DD(DNAV) ◦ OCTS-DD ◦ DCTS-DD

In general, a comparison between the cases corresponding to the same transmis- sion policy of the DATA packet, but using a different policy for CTS transmis- sion, shows that the adoption of an omnidirectional CTS provides better results with respect to the DCTS. It can be observed that, using a directional CTS, more transmissions are allowed, but fewer nodes are informed about the current com- munications and a larger interference is present in the network. Therefore, the use of omnidirectional control packets, enhancing the possible cooperation between the nodes, enables a larger number of simultaneous communications. 100 Chapter 5. Simultaneous Communications in DWNs Using Adaptive Antenna Arrays

12

11

10

9

8

7

6 max

L 5

4

3

2

1

2 4 6 8 10 12 14 16 N

Figure 5.5: Sustainable links as a function of the number of antennas for a random o distribution of the nodes in absence of multipath (σˆϕ = 0 ). ♦ OCTS-SD ♦ DCTS-SD ∗ OCTS-DD(DNAV) ∗ DCTS-DD(DNAV) ◦ OCTS-DD ◦ DCTS-DD

5.7.2 Angular spread and topology

The decrease of Lmax as a function of the angular spread of the channel, shown in Fig. 5.4, confirms the sensitivity of the network behavior to the spatial decor- relation of the signals. Moreover, when the angular spread values become closer o o to the beamwidth of the antenna radiation pattern (σˆϕ = 5 or σˆϕ = 10 , and N = 16), the increase in the number of antennas leads to a small performance improvement. Lmax experiences a considerable decrease in the second analyzed topology, where the nodes are randomly distributed (Fig. 5.5). With respect to the uniform dis- tribution of the nodes, in this case all nodes can be closer to the destination, but the lower value of the average source-destination distance does not sufficiently compensate the larger closeness of the interferers. Moreover, even if the angu- lar spread is low, the six analyzed MAC transmission policies behave similarly (Fig. 5.6). It seems that the level of sophistication of the access scheme in the spa- 5.7. Results 101

a) b) 12 12 11 11 10 10 9 9 8 8 7 7 6 6 max max

L 5 L 5 4 4 3 3 2 2 1 1

2 4 6 8 10 12 14 16 2 4 6 8 10 12 14 16 N N

c) d) 12 12 11 11 10 10 9 9 8 8 7 7 6 6 max max

L 5 L 5 4 4 3 3 2 2 1 1

2 4 6 8 10 12 14 16 2 4 6 8 10 12 14 16 N N

Figure 5.6: Sustainable links as a function of the number of antennas for a random distribution of the nodes and using the disk of scatterers pdf: o o o o a) σˆϕ = 1 , b) σˆϕ = 3 , c) σˆϕ = 5 , d) σˆϕ = 10 . ♦ OCTS-SD ♦ DCTS-SD ∗ OCTS-DD(DNAV) ∗ DCTS-DD(DNAV) ◦ OCTS-DD ◦ DCTS-DD tial domain can partially increase the number of sustainable links, but the physical characteristics of the network play the decisive role in determining the perfor- mance. This behavior suggests that, in a scenario where the nodes are not mobile, such as a backbone WMN, the planning of the network topology may represent a key element for exploiting the capabilities of AAs. The results obtained for both distributions of the nodes show that, with respect to the case where the signals are not subject to multipath, the performance degra- o o dations in a realistic outdoor environment, where 5 ≤ σˆϕ ≤ 15 [23], are in 102 Chapter 5. Simultaneous Communications in DWNs Using Adaptive Antenna Arrays

18

16

14

12

10

max 8 L

6

4

2

0 3 4 5 6 7 8 α

Figure 5.7: Sustainable links as a function of the path-loss exponent in the OCTS- DD(DNAV) case. o o o o o + σˆϕ = 0 N σˆϕ = 1 ∗ σˆϕ = 3 ¤ σˆϕ = 5 I σˆϕ = 10

the order of 15%, 45% and 60% for N = 4, N = 8 and N = 16 antennas, re- spectively. Therefore, not only encumbrance and cost considerations, but also the real characteristics of the network scenario, lead to conclude that a low number of antennas may be sufficient for a device operating in a practical DWN.

5.7.3 Path loss and spatial channel model The influence of the path-loss exponent α on the number of sustainable links for the OCTS-DD(DNAV) case is shown in Fig. 5.7. The increase of Lmax as a func- tion of α is due to the larger signal attenuation, which leads to a decrease of the interference power received by the generic destination. This behavior may seem in disagreement with the results presented in [117] for directional antennas, where the increase of α leads to a decrease of the capacity. Instead, the different conclu- sions are simply due to a slight difference in the analyzed scenarios. In the pre- sented model, as stated by (5.2), the communication range Rc, and so the average source-destination distance Rsd, are decreasing functions of α. By consequence, for fixed values of transmission power and noise, they are modified according to 5.7. Results 103

a) 12

11

10

9

8

7

6 max o L 5 σˆ ϕ =1

4

3 o 2 σˆ ϕ =10

1

2 4 6 8 10 12 14 16 N b) 12

11

10

9

8

7

6 max o L 5 σˆ ϕ =1

4

3

2 σˆ =10o 1 ϕ

2 4 6 8 10 12 14 16 N

Figure 5.8: Sustainable links as a function of the number of antennas adopting different spatial channel models for the OCTS-SD case: a) uniform distribution of the nodes, b) random distribution of the nodes. ♦ Truncated Gaussian ♦ Ring of scatterers ♦ Disk of scatterers ♦ Truncated Laplacian 104 Chapter 5. Simultaneous Communications in DWNs Using Adaptive Antenna Arrays the propagation environment. Therefore, the desired signal power is not affected by a larger attenuation, but the number of simultaneous communications are con- fined within a smaller area. Instead, in [117], the communication range is fixed and the increase of the path-loss exponent determines a strong decrease of the de- sired signal power, leading to a lower number of simultaneous communications. 2 Keeping the variance σˆϕ constant, the presented analytical model is also employed to analyze the influence of the normalized PAS on the number of sustainable links.

To this end, the constants γm1 and γm2 , in (5.5) and (5.6), respectively, are numer- ically evaluated for a given angular spread. Fig. 5.8, obtained for α = 4 in the OCTS-SD case, shows that the influence of the spatial channel model becomes important for large values of N and σˆϕ. Besides, the curve corresponding to the ring of scatterers distribution puts in evidence that, in some scenarios, the increase in the number of antennas may lead to a performance reduction. The values ob- tained using the truncated Laplacian and the ring of scatterers seem to behave respectively as an upper and a lower limitation for Lmax. This can be intuitively justified, observing that, for the truncated Laplacian, the main energy contribu- tion is given by the components closer to the mean DOA, while, for the ring of scatterers, the main energy is carried by the paths that are more distant from the mean DOA (Fig. 5.1). Therefore, in the first case, the main energy contributions are close to the null or to the maximum of the receiving radiation pattern, while the opposite happens in the second case.

5.8 Model validation

The results provided by the analysis are verified, for the OCTS-SD case, employ- ing Network Simulator 2 (ns-2, release 2.29.3), a discrete-event network simulator developed at Berkeley National Laboratory [128]. The first simulation scenario involves a highly symmetrical environment, where the n nodes of the entire topology are subdivided in cells of radius Rc, each one containing n2 nodes. In each cell the destinations and the sources are disposed on two concentric circumferences, whose radii are chosen qual to Rc/3 and Rc (Fig. 5.9). The central cell is surrounded by six other identical cells and, there- fore, it is the most significant one, being subjected to the largest interference. At the i-th step of the simulation n2(i) = 2i nodes are present in each cell. Using the 0 gains Gm, Gm, Gd and Gn, the SINRout value is calculated at each destination of the central cell. If, at the i-th step, at least one destination experiences a SINRout lower than SINRth, the simulated value of Lmax is assumed equal to n2(i − 1)/2. It is worth noticing that, in this case, the values derived by the simulations are nec- essarily integers. This scenario is compared with the theoretical results obtained assuming the uniform distribution of the nodes. 5.8. Model validation 105

Rc π 4 /n2 (i)

Rsd

Figure 5.9: First simulation scenario. The destinations lie in the inner ring, while the sources in the outer one.

The second scenario involves a random distribution of the nodes. The position of each destination is determined, according to (5.42), using two uniformly dis- tributed random variables, in [0, 2π] and in [0,Rt], which generate the polar co- ordinates with respect to the center of the topology. Similarly, the position of each source is selected using two other uniformly distributed random variables, in [0, 2π] and in [0,Rc], which generate the polar coordinates with respect to the proper destination. The reception of a packet is established adopting the threshold criterion and Lmax is evaluated in the area Lc, placed at the center of the topology. The simulations are repeated for different values of the total number of nodes and averaged over 100 different topologies. The good agreement between the theoretical and the simulated values (Table 5.2), confirms the accuracy of the presented model. Analytical and simulation results confirm that adaptive antennas can largely improve the number of simultaneous communications sustainable by the network, even using a small number of an- tenna elements. Finally, Table 5.3 shows the comparison between the exact calculation of Lmax, performed using the nonlinear equations reported in the Appendix, and the itera- tive approach described in Subsection 5.6.3 for the SD cases. The values, obtained o for a uniform distribution of the nodes with α = 4 and σˆϕ = 0 , reveal that the 106 Chapter 5. Simultaneous Communications in DWNs Using Adaptive Antenna Arrays

Uniform distribution N = 4 N = 8 N = 16 A S A S A S o σˆϕ = 0 2.04 2.00 5.65 6.00 11.38 12.00 o σˆϕ = 1 2.04 2.00 5.63 6.00 10.77 11.00 o σˆϕ = 3 2.02 2.00 5.29 5.00 8.40 8.00 o σˆϕ = 5 1.93 2.00 4.72 5.00 5.61 5.00 o σˆϕ = 10 1.75 1.00 3.03 3.00 3.65 4.00 Random distribution N = 4 N = 8 N = 16 A S A S A S o σˆϕ = 0 1.84 1.85 3.79 3.60 7.86 7.27 o σˆϕ = 1 1.84 1.82 3.70 3.60 6.90 6.91 o σˆϕ = 3 1.82 1.82 3.50 3.51 5.18 5.77 o σˆϕ = 5 1.70 1.76 2.90 3.14 3.62 4.48 o σˆϕ = 10 1.56 1.55 2.18 2.45 3.40 3.36

TABLE 5.2: ANALYTICAL (A) AND SIMULATED (S) Lmax INTHE OCTS-SD CASE.

approximated solution converges to the exact one in a small number of steps i0. −4 An absolute error in the order of 10 can be reached for i0 ≤ 8.

5.9 Summary

A mathematical model to evaluate the performance of a distributed wireless net- work using smart antennas as a function of the channel and antenna parameters has been presented in this chapter. The model can be usefully applied for com-

Lmax(N = 4) Lmax(N = 8) Lmax(N = 16) OCTS-SD (exact) 2.0378 5.6535 11.3843 OCTS-SD (approximated) 2.0379(i0 = 4) 5.6536(i0 = 6) 11.3844(i0 = 8) DCTS-SD (exact) 2.4341 5.8927 10.4674 DCTS-SD (approximated) 2.4340(i0 = 5) 5.8927(i0 = 6) 10.4673(i0 = 7)

TABLE 5.3: COMPARISON BETWEEN EXACT AND APPROXIMATED Lmax FOR A UNIFORM DISTRIBUTION OF THE NODES IN ABSENCE OF MULTIPATH. 5.9. Summary 107 parison purposes, in scenarios that require comparison between different spatial statistics, topologies and packet transmission policies. The results obtained from the analysis show that the choice of an omnidirectional CTS transmission leads to better performance than the directional one and, for large values of the angular spread, the performance becomes more dependent on the channel statistic in the spatial domain. Besides, despite the level of sophisti- cation of the antenna system and of the MAC protocol, the network behavior is largely determined by the physical characteristics of the network and the chan- nel. More precisely, the number of simultaneous communications sustainable by a distributed wireless network is largely influenced by the angular spread and the topology, and, in certain environments, the use of a large number of antennas at each node may lead to noticeable benefits only if the spatial correlation between the signal replicas is sufficiently high. Otherwise, the employment of arrays with many elements may be useless or even counterproductive.

Chapter 6

Multi-Antenna and Channel Coding Techniques for Wireless Mesh Routers

The objective of this chapter is the comparison of the low-cost switched-beam antennas with the more expensive adaptive antennas in a wireless mesh network scenario. The analysis is performed together with some considerations regarding the advantages and the practical possibilities of employing multi-antenna systems on mesh routers. The mathematical framework developed in Chapter 5 for a DWN using adaptive arrays is extended to include switched-beam antennas and mobil- ity effects. Besides, in this chapter, the relationship between multiple antenna techniques and coded modulations is investigated, in order to determine the com- bination of antenna system and channel coding technique that may offer the best performance.1

6.1 Introduction

As described in Section 4.1, a WMN is a DWN having dynamic self-organizing and self-configuring capabilities, in which the nodes can be classified in two groups: the mesh clients, which can be mobile, and the mesh routers, forming the backbone of the WMN. The study presented hereafter models the behavior of this second group of nodes. To guarantee the connectivity between the mesh routers, a proper topology plan-

1The content of this chapter is based on F. Babich, M. Comisso and L. Manià, ’Performance Comparison of Advanced Antenna Systems for Wireless Mesh Routers in an Outdoor Environ- ment,’ submitted to International Journal of Wireless and Mobile Computing [173,174,181].

109 110 Chapter 6. Multi-Antenna and Channel Coding Techniques for Wireless Mesh Routers

Undesired Undesired 90 1 90 1 120 60 120 60

150 0.5 30 150 0.5 30 Desired Desired

180 0 180 0

210 330 210 330

240 300 240 300 270 270 a) b)

Figure 6.1: Typical power gain patterns: a) SBA, b) AA.

ning of the backbone is necessary. This planning leads to a scenario in which the neighboring mesh routers are often in LOS. Besides, the mesh routers can have to operate in outdoor environment, where the spatial correlation between the signal replicas can be sufficiently high to enable the use of switched-beam, directional and adaptive antennas. Moreover, the backbone nodes are usually fixed devices that can be connected to a feeding network and, therefore, their operations are not constrained by battery life. By consequence, in mesh routers, the use of multiple antenna systems seems a feasible improvement to reduce the interference and to increase the network capacity. The antenna array of each router can be exploited using different processing tech- niques that determine the so called “level of intelligence” of the entire antenna system. As described in Section 3.6.1, SBAs have limited capabilities in interfer- ence suppression, while AAs are able to perform the electrical beam steering to a desired direction, and null steering to reject undesired signals. On the other hand, switched-beam are cheap systems, while adaptive arrays require more expensive hardware. These differences introduce a tradeoff between cost and performance.

6.2 Sustainable links of SBAs in WMNs

The theoretical model developed in the previous chapter is extended to SBAs in order to compare the performance of the two multi-antenna techniques. To bet- ter explain the choices performed in the development of the analysis, the main differences between SBAs and AAs are emphasized in Fig. 6.1, which provides an example of the typical behavior of the two antenna systems in an interference scenario. The power gain patterns reported in the figure, derived assuming a de- 6.2. Sustainable links of SBAs in WMNs 111

Figure 6.2: Interference regions in the SBA case.

sired direction ϕd = 15o and an undesired one ϕn = 108o, are obtained using a UCA having N = 8 antenna elements and spacing between adjacent radiators equal to λ/2. With respect to AAs, in SBAs the direction of maximum gain and the position of the nulls cannot be varied with continuity. In fact, switched-beam is a multi-antenna technique in which the transmitting/receiving radiation pattern is selected among a finite number of available radiation patterns. In practice, this behavior of SBAs leads to a simplification of the calculations required to obtain the number of sustainable links. The comparison between SBAs and AAs is limited to the OCTS case and to the uniform distribution of the nodes, two conditions that, as described in the previ- ous chapter, lead to the largest number of simultaneous communications. Besides, the extension of the analysis to switched-beam antennas is performed assuming the use of the DNAV in order to obtain better performance also when SBAs are adopted [96]. According to these choices, the interference regions can be mod- eled as shown in Fig. 6.2, and the interference power received by the destination D from each of three regions during the reception of the DATA packet can be evaluated as:

Z 2π Z Rt ntx PtxγαGmFD(ϕ) Pint1 = 2 α rdrdϕ, (6.1a) πRt 0 Rc r Z ϕ3dB Z 2π− 2 Rc 00 ntx PtxγαGmFD(ϕ) Pint2 = 2 rdrdϕ, (6.1b) πR ϕ3dB rα t 2 RL(ϕ)

Pint3 = 0, (6.1c) 112 Chapter 6. Multi-Antenna and Channel Coding Techniques for Wireless Mesh Routers

where Gm is calculated using (5.11), the equivalent power gain pattern FD(ϕ) is defined in (5.9), the radius bounding the region R3 can be evaluated as:

1 00 α RL(ϕ) = Rc[GmFD(ϕ)] , (6.2) and: Z ϕ3dB 2π− 2 00 1 Gm = FD(ϕ)dϕ, (6.3) 2π − ϕ3dB ϕ3dB 2 is the average power gain outside the HPBW. The desired signal power can still be calculated employing (5.23), where the transmitting/receiving power gain in the desired direction for the SBA case becomes:

Z ϕ3dB 1 2 Gd = FD(ϕ)dϕ. (6.4) ϕ3dB ϕ3dB − 2

It can be noticed that, in general, using SBAs, the gain in the desired direction is not equal to one even if FD(ϕ) = G(ϕ) (absence of multipath). In fact, the max- imum of the gain function cannot be steered with continuity, because the pattern is chosen in a set having a finite number of elements. Following the same procedure described in Subsection 5.5.1 for evaluating the output SINR, one can obtain an equation that is formally equal to (5.26), with:

0 00 0 I = Gmχ1 + Gmχ2, (6.5) and:

Z 2π 0 ¯ χ1 = KK FD(ϕ)dϕ, (6.6a) 0 Z ϕ3dB 2π− 2 0 ¯ 00 α1 χ2 = K {[GmFD(ϕ)] − 1} FD(ϕ)dϕ, (6.6b) ϕ3dB 2

¯ where K, K and α1 are defined in (5.36) for a uniform distribution of the nodes in the OCTS case. Finally, substituting (6.5) in (5.26) and manipulating, the number of sustainable links of a backbone WMN in which the nodes employ SBAs can be evaluated as: α 2 α π(Rc Gd − Rsd) Lmax = α α−2 0 00 0 . (6.7) 2SINRthRsdRc (Gmχ1 + Gmχ2) 6.3. Mobility effects 113

Figure 6.3: Model for the source movement.

6.3 Mobility effects

The mesh routers are usually fixed devices and so the communication channel be- tween the backbone nodes can be modeled without considering mobility issues. Conversely, the wireless interface of a mesh router that manages the communi- cations with the mesh clients can experience the typical effects due to a mobile environment: the change of the network topology and the presence of fading.

6.3.1 Modification of the topology

The change of the network topology can be geometrically modeled as shown in Fig. 6.3. The figure is relative to a desired direction ϕd, however, the model- ing process is similar when referred to an undesired direction. As described in Section 5.4, the receiving pattern of the destination D is synthesized during the reception of the RTS packet from the source S. Therefore, the remaining part of the handshake is performed with a pattern that cannot be updated. The time interval during which D can experience problems due to the movement of S lies between the reception of the last bit of the RTS packet until the reception of the last bit of the DATA packet. According to the 802.11 standard, this time interval is given by:

Tmv = SIFS + TCTS + SIFS + TDATA, (6.8) where TCTS and TDATA are the times required to transmit the CTS and the DATA packets, respectively. During Tmv, the source, initially at distance r from D, moves from a position P to a position P’ with a relative vector speed ~v = |~v|ejς . This movement leads to a modification of the mean DOA, from the initial value ϕd to 114 Chapter 6. Multi-Antenna and Channel Coding Techniques for Wireless Mesh Routers the value ϕd + ∆ϕ, where: " # |~v|T sin ς ∆ϕ = ∆ϕ(r) = arcsin p mv , (6.9) 2 2 r + (|~v|Tmv) − 2r|~v|Tmv cos ς considering that the distance traveled by the node during Tmv is |~v|Tmv. At the d end of the communication, the equivalent gain becomes FD(ϕ + ∆ϕ), which, d n in general, is lower than FD(ϕ ). For a null, instead, the new gain FD(ϕ + n ∆ϕ) is larger than FD(ϕ )). Therefore, taking into account the network topology, the average equivalent power gains in a null and in the desired direction can be recalculated in presence of mobility as:

Z Rt n Gn = FD[ϕ + ∆ϕ(r)]%TOPr (r)dr, (6.10a) 0 Z Rc d Gd = FD[ϕ + ∆ϕ(r)]%SOUr (r)dr. (6.10b) 0

where %TOPr (r) and %SOUr (r) are the marginals with respect to r of the pdf of the interferers %TOP(r, ϕ) and the pdf of the sources %SOU(r, ϕ), respectively.

6.3.2 Fading The main cause of performance degradation in a DWN is the power fluctuation of the desired signal. As described in [126], for a given coded modulation tech- nique, fixing the Packet Error Rate (PER) and the packet size, the fading effects can be taken into account by modifying the receiving threshold SINRth. In a mi- cromobility scenario the average value of the receiving threshold can be assumed constant and equal to the SINRth value assigned in absence of mobility. To im- prove communication reliability in presence of fading, the receiving threshold in a mobile environment, SINRth_m, may be modified to meet the outage requirement, the probability of which, poutage, is related to the fading statistic. Accordingly, SINRth_m can be evaluated as: SINR SINR = th , (6.11) th_m z¯ where, for a given poutage value, z¯ can be derived from: Z z¯ poutage = Pr{z ≤ z¯} = %˜FAD(z)dz, (6.12) 0 which depends on the pdf of the squared envelope of the received signal. In this chapter, %˜FAD(z) is modeled adopting the Nakagami distribution, which is ex- pressed by the Gamma density in (2.9). 6.4. Results in not mobile environment 115

12

11

10

9

8

7

6 max

L 5

4

3

2

1

2 4 6 8 10 12 14 16 N

Figure 6.4: Sustainable links as a function of the number of antennas. ♦ SBA (Analysis) ♦ SBA (Simulation) ∗ AA (Analysis) ∗ AA (Simulation)

The choice of a criterion based on the outage probability allows the negotiation between the number of accepted communications and the probability of successful transmission.

6.4 Results in not mobile environment

This section investigates the network behavior in absence of mobility. There- fore, the illustrated performance is relative to the wireless interfaces of the mesh routers employed to manage the communications between the backbone nodes of the WMN. The results are obtained assuming α = 4, Rc = 100 m, Rt >> Rc, SINRth = 10 dB and modeling the DOA statistic with a truncated Laplacian pdf. The physical antenna system is a UCA having N = 8 omnidirectional elements and spacing between adjacent radiators equal to λ/2. In the SBA case G(ϕ) is modeled by the square modulus of the array factor of a UCA with uniform am- plitude excitations [129], while, in the AA case, G(ϕ) is modeled as described 116 Chapter 6. Multi-Antenna and Channel Coding Techniques for Wireless Mesh Routers

a) b) 12 12 11 11 10 10 9 9 8 8 7 7 6 6 max max

L 5 L 5 4 4 3 3 2 2 1 1

2 4 6 8 10 12 14 16 2 4 6 8 10 12 14 16 N N

c) d) 12 12 11 11 10 10 9 9 8 8 7 7 6 6 max max

L 5 L 5 4 4 3 3 2 2 1 1

2 4 6 8 10 12 14 16 2 4 6 8 10 12 14 16 N N

Figure 6.5: Sustainable links as a function of the number of antennas: o o o o a) σˆϕ = 1 , b) σˆϕ = 3 , c) σˆϕ = 5 , d) σˆϕ = 10 . ♦ SBA (Analysis) ♦ SBA (Simulation) ∗ AA (Analysis) ∗ AA (Simulation) in Section 5.3. Both reference patterns are obtained assuming ϕd = 0o, without loss of generality, and the results relative to the use of AAs are referred to the OCTS-SD case. Besides, the values provided by the analysis are compared with the simulations, which are performed adopting the network scenario presented in Section 5.8 (Fig. 5.9). Fig. 6.4 and Fig. 6.5 show the number of sustainable links of the backbone WMN as a function of the number of antennas for different angular spread values. Both analysis and simulation reveal that, even if AAs reach the largest values of Lmax, SBAs can provide a large performance improvement too with respect to the om- nidirectional antenna case. In all considered channel conditions the value of Lmax 6.4. Results in not mobile environment 117 obtained using AAs is approximately twice the value obtained employing SBAs. Intuitively, one could expect that, as the angular spread gets larger, the two an- tenna systems tend to perform similarly. In fact, for large values of σˆϕ, the nulls are really imprecisely placed, not existing a unique DOA for each interferer and, therefore, the interference suppression capabilities of AAs should become almost useless. Instead, adaptive arrays still behave better than switched-beam antennas. This is due to the ability of AAs to maximize the SINR at the array output also in severe channel conditions, which represents, from a signal processing point of view, the main advantage of these advanced systems. This behavior can also be inferred from the formulas obtained during the analysis. A comparison between

(6.7) and (5.31) for Gtx1 = Gm and Gtx2 = Gn, reveals that the two expressions for evaluating Lmax are formally similar and that the interference incoming from the region of insuppressible interference is also modeled by the same expression,2 0 because χ1 in (6.6a) and χ1 in (5.35a) are equal. Instead, the undesired power received from the region of mitigable interference is different in the two cases. 00 When SBAs are adopted, the undesired power is an increasing function of Gm, 2 00 while, using AAs, it is an increasing function of Gn(< Gm). Fig. 6.5c,d can also be used to quantify the theoretical advantages provided by o o multi-antenna systems in a realistic low-rank environment (5 ≤ σˆϕ ≤ 15 ) [23]. Remembering the parameter settings assumed at the beginning of this section, the interference range of a node using an omnidirectional antenna can be approxi- mately calculated as [130]: p 4 ∼ Ri = SINRthRc = 1.78Rc. (6.13)

Considering (optimistically) that one communication can be performed in each 2 circle of area πRi , the number of sustainable links in the omnidirectional case can be approximated by:

2 πRc ∼ Lmax(N = 1) = 2 = 0.32, (6.14) πRi and the spatial reuse is possible only when the couples of communicating nodes are sufficiently sparse. Instead, even considering the worst simulated scenario o (σˆϕ = 10 and N = 4), Lmax becomes equal to one, using SBAs, and equal to two, using AAs. These values determine an increase in the number of sustainable links by a factor 3 and a factor 6, respectively.

2 It is worth noticing that this does not imply that the received interference power from R1 is equal in the two cases, because the reference power gain G(ϕ) and hence the equivalent power gain FD(ϕ) are still different for an AA and a SBA. 118 Chapter 6. Multi-Antenna and Channel Coding Techniques for Wireless Mesh Routers

6.5 Model application: multiple antennas and chan- nel coding

This section shows a further application of the presented analytical model, which is used to investigate the relationship between multiple antenna techniques and coded modulations. The objective is to determine the combinations of channel coding technique and antenna system that may offer the best performance.

6.5.1 Coding techniques Coded modulation techniques have been widely employed to improve the com- munication reliability. In Wi-Fi environment, the convolutional codes have been adopted in the widely diffused IEEE 802.11a/g physical layer standards [59,61]. However, more efficient solutions have been developed by coding theory, such as turbo codes [131], Low Density Parity Check (LDPC) codes [132], and Single Parity-Check (SPC) codes [133,134]. In particular, the employment of the LDPC codes has been considered in the 802.11n physical layer draft extension of the 802.11 standard for WLANs as a non-mandatory improvement [26]. A brief description of the coding techniques that will be analyzed in this section is provided in the following paragraphs.

6.5.1.1 Convolutional codes The IEEE 802.11a/g physical layer extensions support eight bit rates, varying from 6 to 54 Mbits/s, which are obtained selecting the proper mode, namely the mod- ulation scheme and the coding rate Cr. Four modulations are supported: BPSK, QPSK, 16 and 64 Quadrature Amplitude Modulation (QAM). These schemes are combined with different coding rates. The 802.11a/g standard extensions adopt a convolutional encoder that uses a generator polynomial (133, 171)8 of rate 1/2. Some bits of the sequence, derived employing this rate, can be omitted at the transmitter side by puncturing, in order to obtain the code rates 2/3 and 3/4. Usually, in the wireless boards, the working mode can be fixed in order to provide a desired transmission rate or can be adaptively updated accounting for the chan- nel conditions. In both cases, for each bit rate, the threshold SINRth is usually considered the fundamental parameter for selecting the working mode according to the payload size and to the required PER [125–126, 135].

6.5.1.2 Efficient codes A considerable performance improvement may be obtained by replacing the con- volutional codes with more efficient coding techniques. Define efficient code a 6.5. Model application: multiple antennas and channel coding 119

r c p Cr NSPC NSPC NSPC 1/2 200 8 8 3/4 107 15 5 2/3 133 12 6

TABLE 6.1: PARAMETERVALUESADOPTEDFORTHE E-SPC CODES. channel coding technique the performance of which is within 1 dB from the limit- ing performance that can be estimated through the Random Coding Bound (RCB), representing a theoretical upper bound to the probability of decoding error [136]. For a given length of the data block, the PER curve corresponding to the RCB, and the PER curve achievable adding 1 dB to the RCB, named in this study as the Efficient Coding Bound (ECB), describe a region in which the performance of the efficient codes lies. Actually, many commonly adopted coding techniques, such as turbo codes or LDPC codes, are efficient, given that their performance is within 1 dB from the RCB.

6.5.1.3 Extended-Single Parity-Check codes

Multiple Serial and Parallel Concatenated SPC (M-SPC) codes have been pro- r c posed in [134]. Data are arranged in matrix with NSPC rows and NSPC columns. p The encoder produces NSPC parity columns, operating on the original data and on p NSPC-1 permuted versions (of the data in the parallel encoder, and of the data and the previous parities in the serial one). The code rate is:

c NSPC Cr = c p , (6.15) NSPC + NSPC

r c p while the block size is given by NSPC(NSPC + NSPC). These codes show an excellent performance for high rates, such as Cr = 3/4. In [137], an improved version is proposed, namely Extended-SPC (E-SPC), which includes a parity row and is capable of achieving an acceptable performance also for lower rates. The r c p NSPC, NSPC and NSPC values used to obtain the three coding rates adopted in the 802.11a/g extensions are shown in Table 6.1.

6.5.2 Performance figure and design parameters

Convolutional codes, efficient codes and E-SPC codes are compared in this chap- ter combining their employment with AAs and SBAs. The performance figure 120 Chapter 6. Multi-Antenna and Channel Coding Techniques for Wireless Mesh Routers

0 10

−1 10 PER

−2 10

−3 −1 1 3 5 7 9 11 13 15 16 SINR [dB]

Figure 6.6: PER for 200 bytes payload. RCB E-SPC ∗ mode1 ♦ mode3 O mode4 M mode5 / mode6 . mode7 ◦ mode8 used to analyze the code behavior is the sustainable throughput, a quantity de- rived from the number of sustainable links that is defined as:

Smax = Lmax ·R· (1 − poutage). (6.16)

Smax, taking into account the nominal bit rate R and the SINR(≥ SINRth) re- quired to sustain this rate (that influences also Lmax), is used in this study to eval- uate the efficiency of the particular coded modulation technique. The sustainable throughput represents an aggregate quantity accounting for the total information exchanged in the area covered by the communication range of a node, when all the communications are simultaneously performed using the same bit rate. This investigation compares the best performance that may be achieved by adopt- ing convolutional codes, with the best performance one may obtain by adopting the E-SPC codes. Besides, all performance evaluations are compared with the limiting performance that is achieved by adopting the RCB threshold. A packet payload of 200 bytes is adopted, and the threshold values, SINRth, are derived as- suming a PER equal to 1%. For the convolutional encoder adopted in the 802.11a standard the thresholds are set according to [126]. For the RCB and the E-SPC codes SINRth can be derived from Fig. 6.6, which is obtained from Matlab sim- ulations. Finally, to delimit the efficient code region, the ECB thresholds are set adding 1 dB to the RCB ones. The adopted thresholds are summarized in 6.5. Model application: multiple antennas and channel coding 121

SINRth (dB) R Mode Modulation C RCB ECB E-SPC Convolutional (Mbits/s) r 1 6 BPSK 1/2 -2.3 -1.3 -1.1 2.0 2 9 BPSK 3/4 not considered 3 12 QPSK 1/2 0.7 1.7 2.0 5.0 4 18 QPSK 3/4 4.0 5.0 4.5 7.5 5 24 16-QAM 1/2 5.7 6.7 7.4 9.5 6 36 16-QAM 3/4 10.0 11.0 10.6 13.5 7 48 64-QAM 2/3 13.3 14.3 14.5 16.0 8 54 64-QAM 3/4 15.1 16.1 15.9 19.0

TABLE 6.2: 802.11a/g MODESANDTHRESHOLDVALUESINABSENCEOF MOBILITY.

Table 6.2. Observe that mode 2 is not considered, given that it provides worse performance than mode 3 for all channel conditions [135]. It is worth noticing that this study aims to compare the Smax values that may be achieved by using the different combinations of antenna system and channel cod- ing technique. The examined scenario does not consider SINR variations, as in adaptive modulation and coding. Instead, the analysis is performed assuming that the working pairs operate at the minimum SINR value (SINRth) that allows them to employ the relevant mode. For the different system set-ups, the performance is evaluated as a function of the antenna and of the channel parameters, such as the number of radiating elements and the angular spread.

6.5.3 Results 6.5.3.1 Not mobile environment Fig. 6.7 and Fig. 6.8 show the number of sustainable links and the sustainable throughput achievable by each mode using AAs and SBAs, respectively. The re- sults, obtained using the 802.11a/g convolutional encoder, are derived in absence o of mobility for σˆϕ = 10 . In the AA case, mode 5, corresponding to R = 24 Mbits/s, achieves the largest Smax values. Differently, SBAs behave better using the modes corresponding to the lower bit rates and, in particular, using mode 3. These different character- istics may be explained considering the different capabilities of the two antenna systems. The use of a higher modulation scheme in conjunction with a convo- lutional code requires a higher SINR to operate efficiently. AAs are able to pro- 122 Chapter 6. Multi-Antenna and Channel Coding Techniques for Wireless Mesh Routers

20

18

16

14

12

10 max

L 8

6

4

2

2 4 6 8 10 12 14 16 N 200

180

160

140

120

100 [Mbits/s]

max 80 S 60

40

20

2 4 6 8 10 12 14 16 N

Figure 6.7: Sustainable links and sustainable throughput of a backbone WMN using AAs and convolutional coding as a function of the number of antennas for o σˆϕ = 10 . ∗ mode1 ♦ mode3 O mode4 M mode5 / mode6 . mode7 ◦ mode8 6.5. Model application: multiple antennas and channel coding 123

20

18

16

14

12

10 max

L 8

6

4

2

2 4 6 8 10 12 14 16 N 200

180

160

140

120

100 [Mbits/s]

80 max S 60

40

20

2 4 6 8 10 12 14 16 N

Figure 6.8: Sustainable links and sustainable throughput of a backbone WMN using SBAs and convolutional coding as a function of the number of antennas for o σˆϕ = 10 . ∗ mode1 ♦ mode3 O mode4 M mode5 / mode6 . mode7 ◦ mode8 124 Chapter 6. Multi-Antenna and Channel Coding Techniques for Wireless Mesh Routers

700

600

500

400 [Mbits/s] 300 max S 200

100

0 2 4 6 8 10 12 14 16 N

Figure 6.9: Sustainable throughput of a backbone WMN using AAs as a function o of the number of antennas for σˆϕ = 0 . RCB ECB E-SPC Convolutional

vide the required values of SINR for some higher modes, while SBAs have more limited capabilities and work better with the lower modes. Besides, employing switched-beam antennas, a larger number of sustainable links leads, usually, to a larger sustainable throughput, while, employing adaptive arrays, the relationship between Lmax and Smax is less immediate. In particular, in this case, the mode

AA SBA o o mode Lmax(N = 8, σˆϕ = 0 ) mode Lmax(N = 8, σˆϕ = 0 ) RCB 3 24.47 3 22.00 ECB 3 20.08 3 17.48 E-SPC 3 18.96 1 33.31 Convolutional 5 5.97 3 or 1 8.19 or 16.38

TABLE 6.3: BESTMODEANDNUMBEROFTRANSMITTERSFOREACH CODINGTECHNIQUEANDFOREACHANTENNASYSTEM. 6.5. Model application: multiple antennas and channel coding 125

700

600

500

400 [Mbits/s] 300 max S 200

100

0 2 4 6 8 10 12 14 16 N

Figure 6.10: Sustainable throughput of a backbone WMN using SBAs as a func- o tion of the number of antennas for σˆϕ = 0 . RCB ECB E-SPC Convolutional

that maximizes the number of allowed users, does not maximize the sustainable throughput. The results concerning E-SPC codes, RCB and ECB are shown in Fig. 6.9 for AAs and in Fig. 6.10 for SBAs. In the figures, the shaded area identifies the efficient code region, bounded by the limiting performance obtained with the RCB and the ECB. To limit the number of figures not all results are reported, but, for each com- bination of coding technique and antenna system, the mode providing the largest performance is selected (Table 6.3). From the results it can be observed that, using codes that are more efficient than the convolutional ones, the lower modes behave better, even if AAs are employed. Besides, adopting the convolutional codes, the performance improvement that can be obtained increasing the number of anten- nas is lower as compared to the other channel coding techniques. However, for a not too large value of N, the combined use of AAs and convolutional codes may provide a performance that is reasonably close to the efficient code one in the SBA case. Observe that, for both antenna systems, the sustainable through- put obtained by using the E-SPC codes is very close to the efficient code region. 126 Chapter 6. Multi-Antenna and Channel Coding Techniques for Wireless Mesh Routers

300

250

200

150 [Mbits/s]

100 max S

50

0 0 2 4 o 6 8 10 σˆϕ( )

Figure 6.11: Sustainable throughput of a backbone WMN using AAs as a function of the angular spread for N = 8 antennas. RCB ECB E-SPC Convolutional

o Besides, the Lmax values reported in Table 6.3 for N = 8 and σˆϕ = 0 show that the lower modes are associated with a larger number of transmissions. It is also interesting to observe that, in some cases, some modes can provide almost the same values of Smax, as it happens for the modes 1 and 3 for the Convolutional- SBA combination, giving the possibility to choose between a larger number of transmitters or a higher rate value. Recalling that, in the considered scenario, the transmission power is assumed constant, a larger number of transmitters leads to more radiated (and consumed) power in the entire network. Therefore, adopting the Convolutional-SBA combination, mode 3 seems preferable from the point of view of the global power budget, while mode 1 provides a better fairness. As one can expect, when σˆϕ increases, the performance of the entire system de- creases (Figg. 6.11-6.12). In general, both multi-antenna techniques experience a degradation of their interference mitigation capabilities and a lower gain in the desired direction. However, by comparing the slope of the AA plots with the SBA ones, it can be observed that, even if AAs still perform better than SBAs, the sus- tainable throughput of the former system is more sensitive to the channel angular 6.5. Model application: multiple antennas and channel coding 127

300

250

200

150 [Mbits/s]

100 max S

50

0 0 2 4 o 6 8 10 σˆϕ( )

Figure 6.12: Sustainable throughput of a backbone WMN using SBAs as a func- tion of the angular spread for N = 8 antennas. RCB ECB E-SPC Convolutional spread. This different degradation can be explained recalling that the performance of AAs is related to the interference nulling capabilities, which depend on the spa- tial correlation between the signal replicas. Other results, obtained adopting a 5% PER and 20 bytes payload, evidence an analogous behavior.

6.5.3.2 Mobile environment

Fig. 6.13 shows the system performance in presence of Nakagami fading for mN = 1, corresponding to Rayleigh fading. The thresholds in Table 6.2 are mod- ified according to (6.11)-(6.12). It can be observed that, in the SBA case and for each channel coding technique, the mode providing the largest performance re- mains the same for all the values of the outage probability. In the Convolutional- AA and in the E-SPC-AA cases, instead, the optimal mode depends on poutage. This fact explains the irregular behavior of the two curves. In these two cases the markers are used to define the first and the last value of poutage for which a 128 Chapter 6. Multi-Antenna and Channel Coding Techniques for Wireless Mesh Routers

a) 70

60

50

40 [Mbits/s] 30 max S 20

10

0 0 0.2 0.4 0.6 0.8 1 poutage b) 70

60

50

40 [Mbits/s] 30 max S 20

10

0 0 0.2 0.4 0.6 0.8 1 poutage

Figure 6.13: Sustainable throughput as a function of the outage probability for o N = 8 antennas and σˆϕ = 10 in presence of Rayleigh fading: a) AAs, a) SBAs. RCB ECB E-SPC Convolutional ∗ mode1 ♦ mode3 O mode4 M mode5 / mode6 . mode7 ◦ mode8 6.5. Model application: multiple antennas and channel coding 129

a) b) 100 100

80 80

60 60

[Mbits/s] 40 [Mbits/s] 40 max max S S 20 20

0 0 0 0.2 0.4 p 0.6 0.8 1 0 0.2 0.4 p 0.6 0.8 1 outage outage

c) d) 100 100

80 80

60 60

[Mbits/s] 40 [Mbits/s] 40 max max S S 20 20

0 0 0 0.2 0.4 p 0.6 0.8 1 0 0.2 0.4 p 0.6 0.8 1 outage outage

e) f) 100 100

80 80

60 60

[Mbits/s] 40 [Mbits/s] 40 max max S S 20 20

0 0 0 0.2 0.4 p 0.6 0.8 1 0 0.2 0.4 p 0.6 0.8 1 outage outage

Figure 6.14: Sustainable throughput as a function of the outage probability for o N = 8 antennas and σˆϕ = 10 in presence of Nakagami fading: a) AAs with mN = 2, b) SBAs with mN = 2, c) AAs with mN = 4, d) SBAs with mN = 4, e) AAs with mN = 8, f) SBAs with mN = 8. RCB ECB E-SPC Convolutional ∗ mode1 ♦ mode3 O mode4 M mode5 / mode6 . mode7 ◦ mode8 130 Chapter 6. Multi-Antenna and Channel Coding Techniques for Wireless Mesh Routers given mode is used. For example, adopting the Convolutional-AA combination, the largest performance for 0.675 ≤ poutage ≤ 0.800 can be obtained adopting the rate R = 24 Mbits/s (mode 5). For each combination of channel coding technique and antenna system, an optimal value of the outage probability may be determined, leading to the maximum sustainable throughput. Observe that, being AAs able to provide a larger SINR at the receiver output, they maintain satisfac- tory performance for lower values of poutage with respect to SBAs. This behavior suggests that, for systems employing AAs, an aggressive approach where a larger number of communications is allowed may be adopted. Instead, a conservative approach seems more suitable for exploiting the SBA capabilities. Also in the mobile scenario the E-SPC code performance is close to the efficient code region, and, for some poutage values, E-SPC codes can be included in the set of efficient codes. Observe that, in the mobile scenario and for large angular spread values, similar performance can be obtained adopting efficient coding technique regard- less of the sophistication of the antenna system. Finally, Fig. 6.14 shows the system behavior in presence of Nakagami fading for different values of the Nakagami parameter mN. It can be noticed that the per- formance gap between convolutional codes and ECs becomes more evident as the Nakagami parameter gets larger. Besides, for larger mN values the optimal poutage value decreases, while the corresponding Smax value increases. This behavior can be intuitively confirmed observing that, as mN increases, the variance of the Nakagami distribution get lower, leading to less severe fading conditions.

6.6 Considerations

Despite the advantages provided by multiple antenna systems, so far these tech- nologies have been substantially neglected by wireless operators [138], even if their adoption seems very likely in the next two-five years [139,140]. This delay is due to many practical reasons. As described in Section 4.3.1, at MAC layer, the use of multiple antennas may originate difficulties due to deaf- ness, suicide ACK, muteness, exposed and hidden terminal. These problems must be addressed in the design phase [124], taking into account that a commercially appreciable MAC protocol has to maintain the backward compatibility with the widely employed 802.11 standard. Besides, in some scenarios, the employment of multiple antennas can degrade the performance, when the MAC/routing layers are not properly modified and cross-layer optimization techniques are not used [141]. From the theoretical point of view, analysis and simulation of multi-antenna sys- tems employing too idealized models for the antenna pattern, the channel behavior and the network topology may lead to optimistic results that can differ from the actual values [142]. 6.6. Considerations 131

Other fundamental issues are related to the hardware complexity. In this context SBAs and AAs have different requirements. A SBA includes a beamforming net- work, usually realized adopting phase shifters, and a beam selection processor. Instead, a smart antenna system requires RF/IF converters, fast ADC and Digital- to-Analog (DAC) converters, as well as a certain number of high-performance Digital Signal Processors (DSPs) and/or Field Programmable Gate Arrays (FP- GAs). Therefore, to adopt smart antennas, expensive hardware devices and con- siderable implementation efforts are unavoidable [143]. Nowadays, the cheaper hardware required by SBAs makes them more suitable for a system-on-a-chip realization. As a consequence, some chipsets implementing the switched-beam antenna technology are already available at a reasonable cost [144]. This sim- pler multi-antenna technique may be more attractive for wireless operators, given that some backward compatible MAC protocols adopting SBAs have been already proposed in the literature [76]. However, some hybrid antenna systems, aiming to contain cost and complexity by adopting an adaptive approach in azimuth plane and a switched-beam approach in the elevation plane, have been presented re- cently [145]. These research efforts may favor the maturation and the subsequent adoption of the adaptive arrays for portable devices within few years. Summarizing, the theoretical and numerical results demonstrate that adaptive an- tennas are preferable in terms of performance, mainly when not efficient coding techniques are adopted and/or the propagation environment is characterized by low angular spread values. However, cost and complexity considerations suggest the adoption of switched-beam antennas first. By exploiting all the capabilities of this simpler technique, a significant performance improvement may also be ob- tained, still keeping the low-cost characteristics of the mesh routers. The use of a cheaper antenna system in a practical backbone WMN may be a first step towards the full adoption of the most efficient multi-antenna technologies.

Chapter 7

Throughput-Delay Analysis of 802.11 DWNs Using Beamforming Techniques

Purpose of this chapter is to evaluate the aggregate throughput and the successful packet delay that can be achieved by a DWN using switched-beam, directional and adaptive antennas in a multi-hop scenario. The concept of sustainable links, introduced in the previous chapters, and a detailed model for the behavior of the DCF are employed to determine the performance of an 802.11-based network adopting advanced antenna techniques. The characteristics of the 802.11 backoff mechanism are analyzed using a Markov chain model that enables the investiga- tion of the performance in saturated and non-saturated traffic conditions. Besides, suitable 802.11 MAC layer parameter settings, able to exploit smart, directional and switched-beam antenna capabilities, are also discussed.1

7.1 Introduction

The characteristics of the 802.11 backoff scheme, described in Section 4.2.3, have been deeply analyzed in the seminal paper of Bianchi [146], in which a Markov chain model is adopted to study the DCF behavior in saturated traffic conditions. Moving from this first study, several and detailed extensions have been developed in the literature [147–155]. In particular, a model including a finite Retry Limit m is presented in [147], where, in addition, the authors consider the general case

1The content of this chapter is based on F. Babich and M. Comisso, ’Throughput and De- lay Analysis of 802.11-Based Wireless Networks Using Smart and Directional Antennas,’ IEEE Transactions on Communications, accepted for publication [175,182].

133 134 Chapter 7. Throughput-Delay Analysis of 802.11 DWNs Using Beamforming Techniques in which m can be different from the maximum backoff stage m0. The effects of channel errors are analyzed in [148–149], while the effectiveness of the RTS/CTS access is investigated in [150]. A detailed evaluation of the packet delay is per- formed in [151], taking into account transmission errors due to fading and noise. Further extensions to non-saturated traffic conditions are presented in [154–155] and [152–153], where authors consider the case of heterogeneous traffic sources. All these studies are focused on the omnidirectional antenna case and so they as- sume that a unique communication can be performed inside the interference range of a node. However, in presence of advanced antenna systems, it becomes interest- ing to investigate how the 802.11 scheduler behaves when multiple simultaneous communications are allowed. Therefore, in this chapter, the Markov chain model presented in [146–151] is extended to the multi-antenna case. The presented extension employs the concept of sustainable links to calculate, in saturated and non saturated traffic conditions, the classic performance figures of a DWN, such as the aggregate throughput and the successful packet delay. The number of sustainable links, summarizing the number of simultaneous commu- nications that can be performed in a given region according to the characteristics of the antenna system, the topology and the channel, can be viewed as a detailed measure of the potentially available network resources. Combining this measure with an accurate model for the backoff mechanism of the DCF, a realistic frame- work can be obtained for analyzing the actual impact of beamforming techniques on an 802.11 distributed wireless network. This chapter presents the model for the backoff mechanism, according to the 802.11 DCF specifications that have been summarized in Section 4.2.3.

7.2 Markov chain model

The analysis is subdivided in two parts. First, the access procedure of a source adopting the 802.11 DCF in non saturated traffic conditions is modeled adopting a Markov chain. Then, the aggregate throughput, the successful packet delay and the drop probability are derived using the number of sustainable links. The first part of the analysis is performed in this section. Defining as ψs(t) and ψt(t) the stochastic processes representing, respectively, the backoff stage and the backoff timer at time t, the bi-dimensional process {ψs(t), ψt(t)} is modeled by the Markov chain shown in Fig. 7.1, where pc is the conditional probability that the source encounters a collision, CWi0 is the con- tention window size at the i0-th transmission attempt:   1 i0 = −1 i0 0 0 CWi0 = 2 CWmin 0 ≤ i ≤ m , (7.1)  m0 0 0 2 CWmin m < i ≤ m 7.2. Markov chain model 135

Figure 7.1: Markov chain model.

being CW−1 = 1 defined for calculation purposes and being CW0 equal to the minimum contention window CWmin. In the presented model, once the source S has successfully transmitted a packet or has discarded it after the last possible retransmission attempt, a new packet is awaiting transmission in the source buffer with probability Λ1. The state (−1, 0) is the idle state, where S lies if no packets are present in the buffer. When the node is in the idle state a new packet arrives 136 Chapter 7. Throughput-Delay Analysis of 802.11 DWNs Using Beamforming Techniques

with probability Λ2. Both Λ1 and Λ2 depend on the arrival rate and on the time evolution of the chain. In particular, Λ1 accounts for the overall time spent by the source for transmitting the previous packet, while Λ2 is influenced only by the average time between two backoff decrements. The hexagon in Fig. 7.1 does not represent a state, but simply a switch in which time is not spent. The transition probabilities of the chain are:  0 0  Pr{i , i|i , i + 1} = 1 i ∈ [0,CWi0 − 2]  0  i ∈ [0, m]    0 0  Pr{i , i|i − 1, 0} = pc/CWi0 i ∈ [0,CWi0 − 1]   i0 ∈ [1, m]     Pr{−1, 0| − 1, 0} = 1 − Λ2 , (7.2)  0 K 0  Pr{−1, 0|i , 0} = [1 − pc(1 − δi0m)](1 − Λ1) i ∈ [0, m]    0 K  Pr{0, i|i , 0} = [1 − p (1 − δ 0 )]Λ /CW i ∈[0,CW − 1]  c i m 1 0 0  i0 ∈ [0, m]     Pr{0, i| − 1, 0} = Λ /CW i ∈[0,CW − 1]  2 0 0 where i represents the remaining number of slots before backoff expiration and: ½ 0 K 1 i = m δ 0 = , i m 0 elsewhere is the Kronecker delta. As in [146–147, 150], the first equation in (7.2) accounts for the decrement of the backoff timer during the beginning of a slot time, while the second one models a collision at the i0-th transmission attempt. The third equation models the persistence in the idle state. The fourth equation takes into account the source behavior in the case of empty transmission buffer that can occur after a success within the (m−1)-th attempt or when the maximum number of retransmissions is reached. The fifth equation models the behavior of S in the case of nonempty transmission buffer after a successful transmission within the (m − 1)-th attempt or when the maximum number of retransmissions is reached. Finally, the last equation models the packet arrival when the source is in the idle state. The stationary distribution of the chain:

0 0 ψi0,i = lim Pr{ψs(t)=i , ψt(t)=i}, i ∈[−1, m], i∈[0,CWi0 − 1], (7.3) t→∞ 7.2. Markov chain model 137 can be calculated observing that [146]:

i0 ψ 0 = p ψ 0 ⇒ ψ 0 = p ψ , (7.4a) i ,0 µc i −1,0 ¶ i ,0 c 0,0µ ¶ i i i0 ψi0,i = 1 − pcψi0−1,0 = 1 − pc ψ0,0, (7.4b) CWi0 CWi0

0 for 0 < i ≤ m and 0 ≤ i ≤ CWi0 − 1. Besides, the probability ψ−1,0 can be obtained from: Xm K Λ2ψ−1,0 = (1 − Λ1) [1 − pc(1 − δi0m)]ψi0,0, (7.5) i0=0 which, using (7.4a), leads to:

1 − Λ1 ψ−1,0 = ψ0,0. (7.6) Λ2

0 Moreover, for i = 0, ψ0,i can be calculated as: ( ) µ ¶ Xm i K ψ0,i = 1 − · Λ2ψ−1,0 + Λ1 [1 − pc(1 − δi0m)]ψi0,0 CW0 0 µ ¶ i =0 (7.7) i = 1 − ψ0,0. CW0

Using (7.4)-(7.7) and (7.1), the normalization condition for the stationary distrib- ution of the chain can be manipulated as:

Xm CWXi0 −1 1 = ψi0,i i0=−1 i=0 Xm CWXi0 −1 = ψi0,i + ψ−1,0 i0=0 i=0

m CWi0 −1 µ ¶ X X i 0 1 − Λ i 1 (7.8) = 1 − pc ψ0,0 + ψ0,0 CWi0 Λ2 i0=0 i=0 " CW −1 µ ¶ # Xm Xi0 i0 i 1 − Λ1 = ψ0,0 pc 1 − + 0 0 CWi Λ2 "i =0 i=0 # Xm 1 i0 1 − Λ1 = ψ0,0 (CWi0 + 1)pc + , 2 Λ2 i0=0 138 Chapter 7. Throughput-Delay Analysis of 802.11 DWNs Using Beamforming Techniques from which, performing some algebra, one obtains the following expression for ψ0,0:

½ m0+1 2(1−Λ1)(1−pc)(1−2pc)+Λ2CW0(1−pc)[1−(2pc) ] ψ0,0 = + 2Λ2(1−2pc)(1−pc) 0 0 ¾−1 (7.9) CW p (2p )m (1−pm−m )−pm+1 +1 + 0 c c c c . 2(1−pc)

7.3 Throughput-delay analysis

This section describes the second part of the analysis, evaluating the aggregate throughput, the successful packet delay and the drop probability of the DWN. The number of sustainable links is employed in this phase to take into account the communications that can be simultaneously performed using smart, directional and switched-beam antennas. Defining as ptx the transmission probability of the single source (still unknown), the probability Ψtx that at least one transmission occurs in a randomly chosen slot time in the region of suppressible interference R2, is given by:

n2 Ψtx = 1 − (1 − ptx) , (7.10)

2 2 where n2 = nRc /Rt (≥ 2Lmax) is the number of nodes (active and not active) that lie in R2. The probability Ψsucc that a maximum of bLmaxc transmissions are simultaneously successful is given by:

bLmaxc bLmaxc µ ¶ X 1 X 00 00 n2 i n2−i Ψsucc = Ψsucci00 = 00 ptx(1 − ptx) , (7.11) Ψtx i i00=1 i00=1 where b·c denotes the floor function, and µ ¶ n 00 00 2 pi (1 − p )n2−i i00 tx tx Ψsucci00 = , (7.12) Ψtx is the probability that exactly i00 transmissions are successful, conditioned to the fact that at least one source transmits. The probability Ψcol that the transmission attempts collide is given by the probability that more than bLmaxc transmissions occur at the same time: µ ¶ Xn2 1 n 00 00 Ψ = 2 pi (1 − p )n2−i . (7.13) col i00 tx tx Ψtx 00 i =bLmaxc+1 7.3. Throughput-delay analysis 139

Using (7.10)-(7.13), the average time interval, ²slot, between two consecutive time counter decrements can be evaluated as:

²slot = (1 − Ψtx)σslot + ΨtxΨsuccTsucc + ΨtxΨcolTcol, (7.14) where σslot is the slot time duration, Tsucc is the time required by a successful handshake and Tcol is the time wasted because of collision. According to the RTS/CTS mechanism of the 802.11 DCF, these times can be evaluated as [146]:

Tsucc = DIFS + TRTS + TCTS + TDATA + TACK + 3 · SIFS, (7.15a)

Tcol = DIFS + TRTS + TCTS + SIFS, (7.15b)

where TRTS, TCTS, TDATA and TACK, are the times required to transmit the RTS, CTS, DATA and ACK packets, respectively. The average number of slots during which a data packet remains in the chain (regardless of packet successful transmission within the m-th attempt or packet discarding) is: m X CWi0 − 1 0 ² = pi , (7.16) num_slots 2 c i0=0 which, after some algebra, can be expressed as:

CW p (2p )m0 (1−pm−m0 )+pm+1 −1 ² = 0 c c c c + num_slots 2(1−p ) c (7.17) CW [1−(2p )m0+1] + 0 c . 2(1−2pc) This value is calculated considering that, at the i0-th transmission attempt, the number of slots is an integer uniformly chosen in [0,CWi0 − 1]. The presented model requires the calculation of four unknowns, namely ptx, pc, Λ1 and Λ2, which are related to each other and, using (7.9)-(7.17), can be numerically evaluated from the following nonlinear system of four equations:  Xm 1 − pm+1  c  ptx = ψi0,0 = ψ0,0  1 − pc  i0=0    µ ¶  bLmaxXc−1 n − 1 00 00 p = 1 − 2 pi (1 − p )n2−i −1 (7.18)  c i00 tx tx  00  i =0    Λ = 1 − e−Λ·²num_slots·²slot  1 −Λ·²slot Λ2 = 1 − e 140 Chapter 7. Throughput-Delay Analysis of 802.11 DWNs Using Beamforming Techniques

The transmission probability ptx is derived considering that a transmission oc- curs when the backoff timer reaches the zero value [146–147, 150]. The collision probability pc is calculated considering that, if Lmax simultaneous communica- tions can be sustained in R2, pc is given by the probability that more than bLmaxc nodes transmit at the same time in R2. Therefore, the packet transmitted by the source collides if more than Lmax − 1 simultaneous transmissions are performed by the remaining n2 − 1 nodes. Assuming that the packet arrival at each node is a Poisson process with mean Λ, Λ1 is the probability that at least one arrival occurs during the processing of the previous packet, namely ²num_slots · ²slot, and Λ2 is the probability that at least one arrival occurs between two consecutive backoff timer decrements when S is in the idle state. More precisely, the calculation of Λ1 is based on the average time that a packet remains in the chain, while the estimation of Λ2 is based on the average slot duration. The accuracy and the possible limita- tions of these approximations will be discussed in the next section. Once the values of ptx, pc, Λ1 and Λ2 are known, the performance figures of the network can be calculated. In a realistic environment, a considerable part of the simultaneous communications that can be sustained by the network are employed for packet forwarding, because, usually, the source-destination distance is larger than the coverage range of the single node. As described in [156], the pdf of the distance r between two nodes randomly placed on a circle of radius Rt is given by:  p à ! 2 2 2  2r r 4Rt −r 4r r − 4 − 2 arcsin r ∈ [0, 2Rt] %dist(r)= Rt πRt πRt 2Rt (7.19)  0 elsewhere

Evaluating the average value of (7.19), the average number of hops Nhop between a generic source-destination pair can be calculated as:

  Z2Rt » ¼  1  128Rt Nhop =  r%dist(r)dr = , (7.20) Rc  45πRc 0 where d·e denotes the ceiling function. The main performance figure for a network is the normalized aggregate through- put Sag that represents the sum of the normalized throughput of all nodes, where, in turn, the normalized throughput is the fraction of the overall transmission rate used for sending the payload bits. According to the presented model, the nor- malized aggregate throughput of the entire network in a multi-hop environment is evaluated as: 7.4. Results 141

bLXmaxc 00 ΨtxTpl Ψsucc 00 i i 2 i00=1 Rt 1 Sag = · 2 · , (7.21) ²slot Rc Nhop where Ψsucci00 can be calculated from (7.12), and Tpl = bpl/R is the time required to send the payload bits bpl at the transmission rate R. Considering that a packet is dropped when it collides for m + 1 times, the drop probability can be calculated as: m+1 Ψdrop = pc , (7.22) Finally, the successful packet delay T is given by the product between the aver- age number of slots required for a successful transmission ²succ_slots, the average time interval between two consecutive time counter decrements and the average number of hops: T = ²succ_slots · ²slot ·Nhop, (7.23) where: m i0 m+1 X CW 0 − 1 p − p ² = i · c c , (7.24) succ_slots 2 1 − pm+1 i0=0 c is evaluated considering that only not dropped packets must be taken into account. Performing some algebra, this quantity can be rewritten as: pm+1CW 2m0 (pm0−m − 1) + 1 CW [1 − (2p )m0+1] ² = c 0 c + 0 c + succ_slots 2(1 − pm+1)(1 − p ) 2(1 − pm+1)(1 − 2p ) c c c c (7.25) m+1 m0 0 pc [CW02 (m − m + 2) − CW0 − m − 1] − 1 − m+1 . 2(1 − pc ) It is worth noticing that the saturated behavior of the network for the omnidirec- tional antenna case, described in [147, 150], can be obtained from the proposed model by imposing Λ → +∞, Rt = Rc and Lmax = 1. Besides, imposing the further condition m → ∞, one can derive the model presented in [146]. Besides, differently from [153], where the use of two probabilities is adopted for modeling the source behavior in presence of an infinite buffer, in this paper λ1 and λ2 are employed to model the Poisson arrival process in a source having a single place buffer.

7.4 Results

This section presents the results provided by the proposed analysis and compares the theoretical curves with the numerical ones, obtained simulating the backoff procedure of the 802.11 DCF with Matlab. 142 Chapter 7. Throughput-Delay Analysis of 802.11 DWNs Using Beamforming Techniques

182 + bts DIFS 34 µs TRTS 20 µs + Rc 134 + bts SIFS 16 µs TCTS 20 µs + Rc 294 + bpl σ 9 µs T 20 µs + slot DATA R 134 bpl 8184 bits TACK 20 µs + Rc bts 512 bits Rc 100 m R 24 Mbits/s SINRth 10 dB Rc 12 Mbits/s α 4

TABLE 7.1: SYSTEMPARAMETERSASSUMINGTHE 802.11A SPECIFICATIONS FORMODE 5.

7.4.1 Parameter settings

With reference to the model developed in the previous chapters to evaluate the number of sustainable links in the AA and SBA cases, in this section the Lmax values are calculated considering a random distribution of the nodes, modeled us- ing the pdf expressed by (5.42), and choosing a truncated Laplacian pdf to account for the DOA statistic. Besides, the results are referred to an omnidirectional trans- mission of the CTS packet (OCTS case). Even if the adoption of Directional Antennas (DAs) in a DWN was not specifi- cally addressed the previous chapters, it can be easily derived from the SBA and AA cases by noticing that a directional antenna is able to perform a continuous beam steering towards the desired source, but is unable to suppress the interferers. Therefore, the number of sustainable links for the DA case can be calculated using (6.7) and modeling the gain in the desired direction Gd according to (5.13). The numerical results are derived combining the discrete-event Network Simula- tor 2 (ns-2) with a discrete-time simulator developed in Matlab. More precisely, the Lmax value calculated employing ns-2 is passed to Matlab, which performs the discrete-time simulation of the DCF by considering that bLmaxc node pairs can be simultaneously active in a given slot time. Each simulation is stopped when 40000 packets have been processed. To improve the readability of the figures, the confidence intervals are not reported, because they are not distinguishable from the markers. The adopted parameters are chosen according to the 802.11a stan- dard [59], and are summarized in Table 7.1, where Rc is the transmission rate of the control packets, which, in general, can be lower than R. A training sequence of length bts = 512 bits is inserted in the RTS/CTS packets in order to perform 7.4. Results 143

2

1.5

S ag 1

0.5

0 2 8 14 20 26 32 CWmin

Figure 7.2: Saturation throughput as a function of the minimum contention win- o 0 dow for Rt = Rc, σˆϕ = 0 , n = n2 = 25 and m = m = 6. AA (Analysis) ♦ AA (Simulation) DA (Analysis) ¤ DA (Simulation) SBA (Analysis) ◦ SBA (Simulation) 802.11a (Analysis) . 802.11a (Simulation)

the antenna system adaptation (of course this field is not inserted in the omni- directional case). The SINRth value is selected taking into account the coded modulation scheme adopted by the 802.11a extension to provide the bit rate of 24 Mbits/s (mode 5) with a PER equal to 1% [126].

7.4.2 Optimum contention window Figg. 7.2-7.3 show the saturation throughput and the successful packet delay in ab- sence of multipath as a function of the minimum contention window for Rt = Rc, 0 n = n2 = 25, m = m = 6 and N = 4 antennas (except for the 802.11a case where a unique antenna can be used). The figures prove a good agreement be- tween analytical and numerical results, confirming that beamforming can largely reduce the packet delay and increase the network throughput even adopting not highly sophisticated multi-antenna techniques. The curves put in evidence the existence of an optimum value for the minimum contention window, CWopt, for 144 Chapter 7. Throughput-Delay Analysis of 802.11 DWNs Using Beamforming Techniques

−3 x 10 14

12

10

T (s) 8

6

4

2 2 8 14 20 26 32 CWmin

Figure 7.3: Successful packet delay as a function of the minimum contention o window in saturated traffic conditions for Rt = Rc, σˆϕ = 0 , n = n2 = 25 and m = m0 = 6. AA (Analysis) ♦ AA (Simulation) DA (Analysis) ¤ DA (Simulation) SBA (Analysis) ◦ SBA (Simulation) 802.11a (Analysis) . 802.11a (Simulation)

which the throughput is maximized. In particular, CWopt = 3 in the AA case and CWopt = 4 in the DA and SBA cases. Therefore, one may conclude that, to exploit the interference mitigation capabilities of the antenna system, a smaller minimum contention window should be adopted. Besides, it can be observed that, for large values of CWmin, the three antenna systems perform similarly, being their performance much lower than the best one. This behavior puts in evidence that an inappropriate setting of the minimum contention window for a given antenna sys- tem may be equivalent to the adoption of a simpler antenna system characterized by worse performance. As described in [146], Wopt should be chosen according to the network scenario, which, for the single antenna case, is identified by the number of contending nodes. Fig. 7.4 confirms, also for the AA case, the importance of the number of stations for the setting of the optimum contention window. In the figure the bullets denote the Wopt values. Similarly to the omnidirectional antenna case, 7.4. Results 145

2.2 o σˆ ϕ= 0 2

1.8

1.6 Sag 1.4

1.2

o σˆ ϕ= 10 1

0.8 2 8 14 20 26 32 CWmin

Figure 7.4: Saturation throughput as a function of the minimum contention win- dow for different values of the angular spread and of the number of nodes in the AA case using N = 4 antennas. × n2 = 15 n2 = 25 n2 = 40 n2 = 55 n2 = 70

Wopt increases as the number of contending nodes increases. Besides, the slope of the curves near the optimum value indicates that, as n2 and σˆϕ decrease, the throughput becomes more sensitive to the contention window size. By conse- quence, improper settings of Wopt lead to larger performance degradations when the node density is low and multipath is absent. Fig. 7.4 puts also in evidence that, when advanced antenna techniques are adopted, not only the number of con- tending nodes, but also the spatial characteristics of the channel are involved in the characterization of the network scenario. The markers in the figure show that the optimum throughput is very sensitive to the propagation environment, but is less sensitive to the number of nodes. Severe channel conditions, characterized by large values of the angular spread, lead to noticeable throughput reductions, and larger values of CWopt. The increase of the number of contending nodes, instead, can be effectively managed by properly selecting CWmin, in order to mitigate the performance decrease. Table 7.2 shows the dependence of CWopt on the number of antennas and on the maximum backoff stage for the adaptive antenna case. It may be observed that a larger number of antenna elements leads to a considerable increase of through- 146 Chapter 7. Throughput-Delay Analysis of 802.11 DWNs Using Beamforming Techniques

N = 4 N = 8

CWopt Sag T (ms) Ψdrop(%) CWopt Sag T (ms) Ψdrop(%) m = m0 = 1 11 2.03 4.03 17.09 4 5.83 1.12 10.06 m = m0 = 3 7 2.03 4.58 3.95 4 5.83 1.14 0.24 m = m0 = 5 6 2.03 5.12 0.54 3 5.83 1.36 0.07 m = m0 = 7 5 2.03 5.27 0.11 3 5.83 1.38 0.01

TABLE 7.2: DEPENDENCEOFTHEOPTIMUMCONTENTIONWINDOW, THE AGGREGATE THROUGHPUT, THE SUCCESSFUL PACKET DELAY AND THE DROP PROBABILITY ON THE MAXIMUM BACKOFF STAGE AND ON THE NUMBER OF o ANTENNASINTHE AA CASEFOR σˆϕ = 0 .

put, and allows lower average delay and drop probability. The maximum backoff stage affects delay and drop probability, while the throughput may be maintained almost constant by selecting the window size properly. Considering that the char- acteristics of the antenna system are known, the adaptive setting of CWopt in a practical scenario requires the estimation of n2, as described in [157], and the es- timation of σˆϕ. The setting of CWmin as a function of the angular spread may be performed manually, exploiting the approximate knowledge of the propaga- tion scenario, for example making reference to well established models derived o o from measurement campaigns (20 ≤ σˆϕ ≤ 40 in indoor environment [158], o o 5 ≤ σˆϕ ≤ 15 in outdoor environment [23]). The setting of CWmin may also be performed adopting an adaptive approach, which requires the use of proper signal processing algorithms for the estimation of σˆϕ [159]. However, this second so- lution, even if more precise and able to provide optimum results, may lead to an increase of the complexity that may be not justified by the performance improve- ment. In fact, as shown in Fig. 7.4, small variations of CWmin around CWopt have only minor effects on throughput, and so sub-optimal solutions may be ac- ceptable. Sub-optimal settings may also be mandatory for managing the number of contending nodes, considering that, in many cases, the standard hardware does not allow to choose any integer value for CWmin. As previously described, this limitation may lead to a considerable throughput decrease when the number of nodes and the angular spread are low. However, an angular spread close to zero does not represent a realistic situation in a practical 802.11 network.

7.4.3 Non saturated behavior

Fig. 7.5 and Fig. 7.6 show the aggregate throughput and the successful packet de- lay in non-saturated conditions as a function of the net offered load Sinput, which 7.4. Results 147

2

1.5

Sag 1

0.5

0 0 1 2 3 4 5 S input

Figure 7.5: Aggregate throughput as a function of the net offered load for Rt = o 0 Rc, σˆϕ = 0 , n = n2 = 25 and m = m = 6. AA (Analysis) ♦ AA (Simulation) DA (Analysis) ¤ DA (Simulation) SBA (Analysis) ◦ SBA (Simulation) 802.11a (Analysis) . 802.11a (Simulation)

has been defined as the ratio between the aggregate throughput and the success probability. The numerical values confirm the analytical results for the throughput behavior and the delay behavior in saturation and for low traffic load, while there are some differences in the transition zones of the delay curves, due to the slightly different models adopted in analysis and simulation. In both cases, a station is assumed to have a single place buffer in which it can store the next packet to transmit. In the analysis, the buffer content is updated only once, at the end of the previous packet transmission phase (using the average transmission duration), while, in the discrete-time simulation, the buffer content is updated regularly at each time step. For this reason, in the analysis, when the input traffic is approaching saturation, the probability of having another ready packet approaches one much faster than in simulation (a similar behavior is obtained by adopting a larger buffer in sim- ulation, as it can be easily verified). This behavior leads to a rapid increase of the average number of slots required for a successful transmission ²num_slots that 148 Chapter 7. Throughput-Delay Analysis of 802.11 DWNs Using Beamforming Techniques

−3 x 10

8

7

6

T (s) 5

4

3

2

1

0 1 2 3 4 5 S input

Figure 7.6: Successful packet delay as a function of the net offered load for Rt = o 0 Rc, σˆϕ = 0 , n = n2 = 25 and m = m = 6. AA (Analysis) ♦ AA (Simulation) DA (Analysis) ¤ DA (Simulation) SBA (Analysis) ◦ SBA (Simulation) 802.11a (Analysis) . 802.11a (Simulation)

determines, in turn, the fast increase of T , as it can be inferred from (7.23). This limitation of the proposed non-saturated model does not affect the throughput, which is not dependent on ²num_slots. A more accurate estimation of the arrival process should account for both the retransmission attempt i0 and the correspond- ing backoff timer. This may lead to a considerable increase of complexity due to the doubling of the number of states required to analyze the single place buffer case.

7.4.4 Number of nodes Finally, Fig. 7.7 shows the performance in saturated traffic conditions of a DWN as a function of the number of nodes. The results are obtained for a multi-hop scenario, where Rt = 300 m and CWmin is selected equal to 4. As one can expect, the employment of AAs is able to provide a larger throughput and to allow the access to a larger number of nodes, while guaranteeing, at the 7.5. Summary 149

T (s) Sag 6 0.085

5 0.07

4 0.055

3 0.04

2 0.025

1 0.01

0 200 400 600 800 1000 1200 n

Figure 7.7: Saturation throughput and successful packet delay as a function of the o number of nodes for Rt = 300 m, σˆϕ = 0 , CWmin = 4 and N = 8. Throughput (AA) Throughput (DA) Throughput (SBA) • Delay (AA) • Delay (DA) • Delay (SBA) same time, a lower delay with respect to directional and switched-beam antennas. Besides, for each antenna system, there is an optimal value of the number of nodes, nopt, which leads to throughput maximization. This value gets larger as the antenna system gets more sophisticated. Furthermore, comparing the successful packet delays calculated in the respective nopt values of the three antenna systems, it can be observed that in optimal conditions SBAs provide a lower throughput, but are able to guarantee a lower delay with respect to directional and adaptive antennas.

7.5 Summary

The theoretical results provided in this chapter, and validated by simulations, put in evidence that an efficient exploitation of the antenna system can be obtained adopting an aggressive approach, in which the minimum contention window must be kept as low as possible in order to force the network to perform simultaneous communications. The results show that the main cause of performance degrada- tion are due to the channel, while a larger number of contending nodes can be 150 Chapter 7. Throughput-Delay Analysis of 802.11 DWNs Using Beamforming Techniques managed by properly setting the 802.11 DCF parameters. The minimum con- tention window should be adapted to the sophistication of the antenna system, the number of contending nodes, the angular spread of the channel and the number of antennas in order to exploit the potential offered by multiple antenna techniques in terms of sustainable links. Chapter 8

On the Influence of Array Geometry in DWNs Employing Smart Antennas

By adopting a numerical approach, this chapter investigates the influence of the geometrical configuration of the antenna array on the behavior of a DWN using smart antennas. A discrete-time simulator for the MAC/PHY layers is developed in order to evaluate the performance of the network. The study adopts a spe- cific MAC protocol, previously proposed for ad-hoc networks, able to exploit the interferer suppression capabilities of adaptive arrays in a low-rank channel. Sim- ulations are performed to evaluate the dependence of the aggregate throughput and of the successful packet delay on the geometry of the physical antenna sys- tem, taking into account the constraints due to the size of the terminal. Besides, it is examined how the network behavior is influenced by the training sequence length and by the speed of the mobile nodes.1

8.1 Introduction and array geometry description

The terminal size is one of the most important constraints for the physical antenna system design. In a distributed wireless network the nodes are usually handy devices and so cumbersome structures must be avoided. The possibility to use a multi-antenna system on a node belonging to a DWN is related not only to the size of the single radiator, but also to the displacement of the elements on the available

1The content of this chapter is based on F. Babich, M. Comisso, M. D’Orlando, and L. Manià, “Performance Evaluation of Distributed Wireless Networks Using Smart Antennas in Low-Rank Channel,” IEEE Transactions on Communications, vol. 55, no. 7, pp. 1344–1353, Jul. 2007 [171,179].

151 152 Chapter 8. On the Influence of Array Geometry in DWNs Employing Smart Antennas

Figure 8.1: Characteristics of the analyzed array geometries: a) ULA, b) URA, c) UCA, d) CRA.

area. In this study, the number of omnidirectional antenna elements, N, is chosen taking into account the maximum area that the array can occupy. In particular, for each array, N is selected modeling the device as a square having an edge equal to 18 cm, which may represent the typical size of a small laptop. The size of each radiator is assumed as negligible and the operating frequency is selected equal to 2.484 GHz, corresponding to the ISM band adopted in the 802.11 legacy version and in the 802.11b/g amendments. This choice leads to a carrier wavelength λ approximately equal to 12 cm. The presented study is performed imposing the further constraint that the minimum distance between two neighboring radiators be equal to λ/2 = 6 cm in order to avoid significant mutual coupling effects. Four different array geometries are analyzed (Fig. 8.1). The first array is a ULA with NULA = 4 elements, spaced by ρl = λ/2. The second array is a URA, having 8.1. Introduction and array geometry description 153

x y NURA = Nx · Ny = 4 · 4 = 16 elements at distance ρr = ρr = λ/2. The third array is a UCA having NUCA = 8 elements and radius:

λ ρc = , (8.1) 4 sin (π/NUCA) selected according to the constraint relative to the minimum distance between neighboring radiators. The last array is a CRA with a central radiator and two rings having respectively NCRA1 = 4 and NCRA2 = 8 elements. The CRA occupies the same area of the UCA, but is formed by NCRA = 1 + NCRA1 + NCRA2 = 13 radiators. According to the notation of Section 1.3, the antenna system power gain in the azimuth plane is written as: ¯ ¯ ¯XN ¯2 ¯ j 2πvc τ (ϕ)¯ G(ϕ) = ¯ w e λ k ¯ , (8.2) ¯ k ¯ k=1

T where the weight vector w = [w1, w2, ..., wN ] is updated using the unconstrained LMS algorithm and the delay at the k-th antenna element, τk(ϕ), includes the characteristics of the array geometry. For the URA and the CRA the weights are reordered to obtain vectors instead of matrices (Fig. 8.1b,d). The order can be inferred by the numbers placed near the radiators. With reference to the adopted geometrical dimensions, the delays for the ULA, the URA, the UCA and the CRA can be calculated, respectively, as: µ ¶ λ NULA +1 τk(ϕ)= k− cos ϕ, (8.3) 2vc 2 ·µ» ¼ √ ¶ µ ¹ º √ ¶ ¸ λ k NURA +1 k−1 NURA +1 τk(ϕ)= − cos ϕ− k−4 − sin ϕ , (8.4) 2vc 4 2 4 2 ·µ ¶ ¸ λ 1 ˜ τk(ϕ)= cos k − ξ − ϕ , (8.5) 4 sin (π/NUCA) vc 2   0 k = 1  λ  cos[(2k − 3)ξ˜− ϕ] 2 ≤ k ≤ 5 τ (ϕ)= · "Ã ! # , (8.6) k ˜  11 8 sin(ξ/2)vc  2 cos k − ξ˜− ϕ 6 ≤ k ≤ N  2 CRA

˜ where ξ = 2π/NUCA. 154 Chapter 8. On the Influence of Array Geometry in DWNs Employing Smart Antennas

Figure 8.2: Channel model.

8.2 Signal and channel model

According to the scenario adopted for the theoretical analysis, the simulation en- vironment is modeled assuming that, during the reception of the DATA packet, the generic destination receives the signals incoming from ntx nodes, representing the number of active transmitters. This value, which includes the desired source and the interferers, depends, in practice, on the temporal evolution of the network, because of the asynchronous characteristic of the 802.11 DCF. By consequence, in the discrete-time simulator employed in this study, ntx may change during the time required to receive the DATA packet. However, to avoid cumbersome nota- tions, this dependence is not explicitly introduced in the adopted symbols. The low-rank propagation environment is simulated using the ring of scatterers model (Paragraph 2.2.1.4). In particular, the generic l-th active source Sl is sur- rounded by Q = 20 scatterers that are uniformly placed along the circumference ˜ of radius d (Fig. 8.2). The azimuth DOA ϕlq, corresponding to the q-th scatterer of the l-th source, and the amplitude attenuation Υlq can be calculated, by geo- metrical considerations, as:  Ã !  ˜ 2π  d sin q + ϕ0l   Q  ϕ = arctan  Ã ! + ϕ , lq   0l (8.7a)  2π  d − d˜cos q + ϕ l Q 0l

 v  α u à ! 2 u 2π Υ = d˜+ td2 + d˜2 − 2d d˜cos q + ϕ  , (8.7b) lq l l Q 0l 8.2. Signal and channel model 155

where dl is the distance between the l-th source and the destination, ϕ0l is the mean DOA with respect to D, and ϕlq ∈ ]ϕ0l − γm1 , ϕ0l + γm1 [ , with: " Ã !# Ã ! d˜ d˜ γm1 = max arcsin ' max , (8.8) 0≤l≤ntx dl 0≤l≤ntx dl which represents an acceptable approximation for a low-rank channel. Using (2.11) and (2.12), the angular spread relative to the l-th source can be evaluated as: v uP ÃP !2 u Q P ϕ2 Q P ϕ t q=1 rxlq lq q=1 rxlq lq σˆϕl = PQ − PQ , (8.9) q=1 Prxlq q=1 Prxlq 2 where Prxlq = Ptx/(Q·Υlq) is the power of the replica received from the direction ϕlq assuming a constant transmission power Ptx (equal for all nodes). The total signal incoming on the k-th antenna element at time t is:

Xntx p ˜ xk(t) = Ptxhkl(t)sl(t) +n ˜Gk (t), (8.10) l=1 where sl(t) is the signal transmitted by the l-th source, n˜Gk (t) accounts for the Gaussian noise and: XQ 1 1 jζ +j2πf Dt q h˜ (t) = √ e lq lq · a , (8.11) kl Q Υ kl q=1 lq is the channel response. In particular, ζlq is randomly selected in [0, 2π] and: µ ¶ |~v | 2π f D = l cos q + ϕ − ς , (8.12) lq λ Q 0l l represents the Doppler shift relative to the q-th replica of the l-th source due to the jςl q j2πvcτk(ϕlq)/λ relative speed vector ~vl = |~vl|e . Besides, in (8.11), the term akl = e is the phase factor with which the q-th path of the signal transmitted by the source l reaches the k-th element of the array. This quantity may be viewed as a gener- alization of the generic component of the steering vector in presence of multipath and takes into account the geometrical characteristics of the antenna array. T The samples of the received signal vector x(i) = [x1(i), x2(i), ..., xN (i)] are processed by the LMS algorithm, which updates the weight vector w and creates the receiving radiation pattern. Assuming that the first source is the desired one, the output SINR at the destination is evaluated as:

PQ G(ϕ1q)Prx SINR = q=1 1q , (8.13) out Pntx PQ i=2 q=1 G(ϕlq)Prxlq + W 156 Chapter 8. On the Influence of Array Geometry in DWNs Employing Smart Antennas

Figure 8.3: Time line for SCSMA/CN.

where G(ϕlq) indicates the computed smart antenna power gain in ϕlq direction. Assuming that an error detecting code is employed, as it is the case for the IEEE 802.11 legacy version, the correct reception of a packet during the simulation is established using the threshold SINRth.

8.3 Adopted MAC protocol

As described in Section 4.3, being the 802.11 DCF designed assuming omnidirec- tional transmissions and receptions, it is unable to guarantee a high performance level for the interfered communication. To improve the resistance of the DWN against the undesired sources and to allow the investigation of the interference suppression capabilities of the four analyzed array geometries, the MAC proto- col proposed in [104] is implemented in the simulator. A brief description of this access scheme, called Selective CSMA with Cooperative Nulling (SCSMA/CN), is given below. The symbols (o), (a) and (b), in Fig. 8.3, mean omnidirectional operating mode, adaptive phase and beamforming operating mode, respectively. SCSMA/CN adopts a six way handshake RTS/CTS/CN/CN/DATA/ACK, in which all transmissions are omnidirectional (o), as in 802.11 DCF, but the DATA and ACK packets are received in beamforming operating mode (b). The RTS/CTS exchange (o), performed by the source and the destination, is followed by the ex- change of the CN packets. This second phase involves the neighbors and is used by the source and the destination to update (a), their antenna weight vectors. The CN packets are sent (o) by the nodes that have received the RTS and/or the CTS, and have updated their omnidirectional NAVs. In particular, the nodes having a packet for the source or the destination, set a long NAV to avoid unnecessary 8.4. Simulation platform 157 transmissions to busy stations, while the other nodes set a short NAV to protect the omnidirectional phase of the handshake. All the CN packets have the same length, but contain different sequences of bits. The CNs transmitted by the source and the destination (CNT), contain the training sequence (unique for all the nodes of the network), while the CNs transmitted by the other nodes contain an arbitrary sequence, different from the training one. A collision can occur if part of the train- ing sequence is transmitted at the same time by two or more neighboring nodes. Once the weight vectors of the antenna systems have been updated, the source and the destination transmit, respectively, the DATA and the ACK packets (o), using the computed weights to receive the ACK and the DATA packets (b). The first transmission attempt and the possible retransmissions are scheduled according to the backoff scheme of the 802.11 DCF. In SCSMA/CN, the physical CS information collected by a neighbor is used to de- lay a transmission only for the duration of the omnidirectional RTS/CTS exchange between the communicating nodes, while this transmission is allowed during their DATA/ACK exchange (except for the case where the neighbor sets the long NAV). This aggressive approach is compensated by a careful protection of the receiving phase of the DATA/ACK packets. SCSMA/CN is an access scheme that tries to suppress the interference due to ongoing transmissions and, using the CN pack- ets, it tries to avoid interference due to potential future transmissions. On one hand, the omnidirectional transmission of all involved packets produces a higher level of interference with respect to the directional transmission. This drawback becomes more evident during the exchange of the CNs that must be sent by all the neighbors. On the other hand, the omnidirectional transmission guarantees a reduction of the hidden terminal and the deafness phenomena, because the com- municating nodes can be sensed more easily. Therefore, even if, with respect to other proposed access schemes [105, 111], SCSMA/CN does not completely ex- ploit the potential offered by smart antennas in terms of throughput maximization, it largely reduces the MAC layer problems usually associated to the adoption of multiple antennas. This advantage provides a less troubled scenario for the pur- pose of this chapter, which is the comparison between different array geometries in terms of interference reduction.

8.4 Simulation platform

Discrete-event simulators represent powerful tools to evaluate the network perfor- mance that usually do not require long simulation time, but, unfortunately, are not able to take into account the details of the physical layer. Therefore, a discrete- time simulator has been developed in this chapter to analyze the network behavior adopting more precise models for the channel and the antenna system. Even if 158 Chapter 8. On the Influence of Array Geometry in DWNs Employing Smart Antennas

Figure 8.4: MAC/PHY discrete-time simulator. 8.4. Simulation platform 159 the time required to obtain the performance becomes longer, the discrete-time ap- proach has been preferred because it provides the possibility to have direct access to the physical layer parameters. Fig. 8.4 shows the main components of the MAC/PHY simulator that has been im- plemented in Matlab. The process of initialization sets all counters to zero, fixes the desired values for the MAC/PHY and the channel parameters, and creates the network topology. Besides, the initialization process generates the list of one-hop neighbors of each node and the matrix of relative positions, which contains the distance and the angle from which each node sees the others. If the nodes are mobile these two elements are periodically updated during the simulation. The minimum adopted time step is equal to 1 µs. Once a packet is generated, the source verifies that the long and the short NAVs have zero value, and then waits for a DIFS monitoring the channel activity. If the channel is idle the source transmits, otherwise a random backoff is generated. At the beginning of the transmission the list of active nodes is updated, the signals are generated according to the position of the neighbors (as stated by the SC- SMA/CN protocol), and the channel matrices are created according to the propa- gation model described in Section 8.2. The received signals are then processed by the beamforming algorithm to produce the radiation patterns of the source and of the destination. If both SINRs are larger than the receiving threshold, the commu- nication between the two nodes is considered established. This first part simulates the omnidirectional phase of the handshake RTS/CTS/CN/CN. The created patterns are also used to update the SINRs during the DATA/ACK exchange taking into account the activity of the network nodes. The SINR re- quirement is verified at the destination during the DATA transmission time, while it is verified at the source during the ACK transmission time. Mobility effects are generated assuming that the nodes move on straight trajectories. The direction of movement is randomly selected at the beginning of the simulation and then kept constant. The positions of the nodes are regularly updated and so the Doppler shifts can be different for each communication. When the DATA transmission begins, the channel simulator produces a vector of samples having the same du- ration of the packet transmission time. Generated packets, successes, failures, retransmissions and delays are monitored during the temporal evolution of the simulation.

8.4.1 Adopted parameters The simulation scenario involves a DWN with n = 25 nodes arranged in two topologies: a random one and a regular grid. Both topologies occupy an area cor- responding to a square having an edge equal to 200 m. In the regular grid the dis- tance between neighboring nodes is 50 m and the coverage range of each node is 160 Chapter 8. On the Influence of Array Geometry in DWNs Employing Smart Antennas

DIFS 50 µs bPHY_hdr 192 bits SIFS 10 µs bMAC_hdr 224 bits CWmin 32 bhdr bPHY_hdr + bMAC_hdr m 7 bpl 8184 bits 0 m 5 bRTS 160 + bPHY_hdr + bts σslot 20 µs bCTS 112 + bPHY_hdr + bts R 1 Mbits/s bDATA bhdr + bpl Rc 1 Mbits/s bACK 112 + bPHY_hdr

TABLE 8.1: PARAMETER VALUES USED IN THE SIMULATIONS.

set to 95 m. The noise power can be derived from (5.1), with SINRth = 10 dB and α = 4. The transmission power Ptx is set to 100 mW, a usual value for a notebook computer or a PDA using a standard Personal Computer Memory Card Interna- tional Association (PCMCIA), or a built-in Wi-Fi adapter. The packet arrival is assumed to be a Poisson process and each source selects randomly a destination among the nodes inside its coverage range. Performance figures are the successful packet delay and the aggregate throughput, which are obtained adopting the parameters shown in Table 8.1, where bhdr repre- sents the number of bits of the header, given by the sum of bMAC_hdr and bPHY_hdr denoting the number of bits of the MAC and PHY headers, respectively. Besides, in the table, bRTS, bCTS, bDATA and bACK indicate the number of bits of the RTS, CTS, DATA and ACK packets, respectively. These parameters are selected ac- cording to the DSSS physical specifications of IEEE 802.11 legacy version [58].

8.5 Results

8.5.1 Access scheme Fig. 8.5 shows the SCSMA/CN performance in a random topology and in a regular grid topology. The curves are obtained employing the array geometries described in Section 8.1 and using a training sequence of length bts = 512 bits. In the figure, the horizontal and vertical lines above the curves indicate the confidence intervals at 95%, which are determined by running 10 simulations for each point. As one can expect, SCSMA/CN is able to provide higher throughput values with respect to the omnidirectional 802.11 DCF when a proper physical antenna sys- tem is adopted. In general, the physical CS information is employed only if an omnidirectional RTS/CTS/CN/CN exchange is sensed. This approach, in which the transmission attempts are performed independently of the interference level of 8.5. Results 161

a) 0.08 Topology

0.07

0.06

0.05

0.04

0.03 Successful packet delay (s) 0.02

0.01 0 0.5 1 1.5 2 Aggregate throughput b) 0.08 Topology

0.07

0.06

0.05

0.04

0.03 Successful packet delay (s) 0.02

0.01 0 0.5 1 1.5 2 Aggregate throughput

Figure 8.5: Simulated successful packet delay and aggregate throughput of IEEE 802.11 DCF and SCSMA/CN for various array geometries: a) random topology, b) grid topology. × SCSMA/CN (ULA) M SCSMA/CN (URA) • SCSMA/CN (UCA) ♦ SCSMA/CN (CRA) ◦ IEEE 802.11 DCF 162 Chapter 8. On the Influence of Array Geometry in DWNs Employing Smart Antennas the network, is too aggressive for a ULA having only four antennas, but is effec- tive adopting the other three array geometries. Another advantage of SCSMA/CN is the differentiation between long and short NAV, which leads to a decrease of the successful packet delay for low traffic load. In high load conditions, the finite value of the Retry Limit and the aggressiveness of the access scheme reduce the average delay for the successful packets, even if the simulations show that this improvement is obtained at a cost of a larger number of dropped packets. This behavior may be useful in real-time applications, and in scenarios in which the time constraints become more important than throughput.

8.5.2 Array geometry Due to the limited use of CS information during the DATA/ACK exchange, the number of nodes that are authorized to communicate gets very large. In such a scenario, the network performance is mainly determined by the spatial filtering and the interference suppression capabilities of the antenna system. Among these two features, the first one depends on the FNBW and the SLL of the receiving pattern, while the second one depends on the available number of nulls as well as by their depth. In this context a key role is played by the antenna array geometry. To emphasize the most relevant characteristics of the four geometrical configura- tions that are compared in this study, the typical power gain patterns generated by the four arrays for ϕd = 0o in a regular grid topology are plotted in Fig. 8.6. In both considered network topologies, the number of undesired sources that a node equipped with a ULA has to suppress is, in general, too high with respect to the number of elements of its array (NULA = 4) and, mainly in high load con- ditions, the interference level is not sustainable. Moreover, ϕFN is large and the neighbor interferers (in terms of angle) have a high probability of lying in the re- gion covered by the main lobe (Fig. 8.6a). Further, when the communications take place in the azimuth plane, the geometrical configuration of the radiators causes a grating lobe at 180o with respect to the desired direction. All these drawbacks determine the poor performance of the ULA. The higher number of elements of the URA (NURA = 16) makes this configura- tion more effective against interference in terms of number of available nulls as well as in terms of FNBW and SLL (Fig. 8.6b). The higher spatial filtering capa- bilities of the URA guarantee a more selective discrimination between desired and undesired sources, leading to higher performance. By consequence, the rectangu- lar array receives less interference with respect to the linear one. However, the periodic arrangement of the elements of the array may create grating lobes in the radiation pattern [160]. Differently from a ULA, in which a grating lobe is always present when the communications take place in the azimuth plane, in a URA the creation or not of a grating lobe depends on the position of the desired source. 8.5. Results 163

a) b)

90 1 90 1 120 60 120 60 0.8 0.8

0.6 0.6 150 30 150 30 0.4 0.4

0.2 0.2

180 0 180 0

210 330 210 330

240 300 240 300

270 270

c) d)

90 90 1 1 120 60 120 60 0.8 0.8

0.6 0.6 150 30 150 30 0.4 0.4

0.2 0.2

180 0 180 0

210 330 210 330

240 300 240 300

270 270

Figure 8.6: Power gain patterns in the azimuth plane: a) ULA (ϕFN '126o, ϕ3dB '84o), b) URA (ϕFN '60o, ϕ3dB '26o), c) UCA (ϕFN '86o, ϕ3dB '36o), d) CRA (ϕFN '106o, ϕ3dB '50o).

However, even if the rectangular configuration is less affected by this drawback, the URA seems not to be the most effective solution, given that the arbitrary sce- narios in which a DWN has to operate may require the communication with nodes that lie in the same plane of the antenna array structure. Despite the higher number of elements and the lower SLL, the performance of the URA can be lower than the performance of the geometries having a circular symmetry. In fact, given the absence of grating lobes in the azimuth plane, the systems adopting the UCA (Fig. 8.6c) and the CRA (Fig. 8.6d) may achieve a higher throughput. A direct comparison between the UCA and the CRA shows that the use of two rings does not guarantee higher immunity against interference for all network topologies. As described in [161], the concentric ring array pro- 164 Chapter 8. On the Influence of Array Geometry in DWNs Employing Smart Antennas

0.08

0.07

0.06

0.05

0.04

0.03 Successful packet delay (s)

0.02

0.01 0 0.5 1 1.5 2 Aggregate throughput

Figure 8.7: Successful packet delay as a function of the aggregate throughput for o various training sequence lengths in a grid topology adopting the UCA (σˆϕ = 0 ). • bts = 128bits • bts = 512bits • bts = 1024bits vides a lower SLL and a wider FNBW with respect to the uniform circular array. Actually, the inner ring of the CRA reduces the interelement spacing, leading to a wider beamwidth, but also to a reduction of the level of the minor lobes. These characteristics are advantageous in the random topology [117]. Conversely, the higher interelement spacing of the UCA causes higher side-lobe levels and a nar- rower beamwidth, leading to better performance in the grid topology. Therefore, the choice between a physical antenna system producing a narrow beam and a physical antenna system producing low side-lobe levels seems to be dependent on the network topology.

8.5.3 Training sequence To determine the effects of the training sequence length on the performance of the DWN, a set of simulations is executed in the grid topology, adopting the UCA and varying the size of the CN packets (Fig. 8.7). As shown in the figure, there is a tradeoff between the overhead introduced by using long training sequences and the interference suppression capabilities of the antenna system. The length of the training sequence has a direct impact on two 8.5. Results 165

0.08

0.07

0.06

0.05

0.04

0.03 Successful packet delay (s)

0.02

0.01 0 0.5 1 1.5 2 Aggregate throughput

Figure 8.8: Successful packet delay as a function of the aggregate throughput in multipath fading environment adopting the UCA in a grid topology (bts = o 512 bits, σˆϕ = 1 ). B |~v| = 0 km/h B |~v| = 2 km/h + |~v| = 5 km/h O |~v| = 10 km/h aspects of the pattern nulls: the accuracy of their steering and their depth. In particular, as the training sequence becomes longer, deeper nulls are more accu- rately placed. It follows that, the higher values of the successful packet delay for bts = 128 bits and, respectively, bts = 1024 bits, compared with the more effec- tive length bts = 512 bits, are due to opposite reasons. For bts = 128 bits, the nulls are not very deep and are placed in an unprecise way. This implies that the receiving node has poor resistance against the interference, leading to an increase of the transmission failures that, in turn, increases the number of retransmissions. Conversely, for bts = 1024 bits, deeper nulls are precisely placed. This guaran- tees higher immunity against interference, but the duration of the entire handshake requires longer time.

8.5.4 Multipath fading The joint effects of multipath and mobility are shown in Fig. 8.8. The results are obtained using the UCA in the grid topology with a maximum angular spread 166 Chapter 8. On the Influence of Array Geometry in DWNs Employing Smart Antennas

max o σˆϕ = max σˆϕl = 1 and a training sequence of 512 bits. 0≤l≤ntx As expected, in a single-hop scenario with a fixed bit rate, the performance de- creases as the mobility increases. A higher node speed lowers the throughput, because of the faster fluctuations of the desired signal power. This degradation is emphasized by the assumption that the correct reception of a packet is established using a threshold criterion, which determines the discarding of the packet even if a single bit is received incorrectly. It is worth noting that, when an interferer falls into a deep fade, a higher SINR can be experienced by the destination, but other active nodes may produce a higher interference for a certain amount of time. By consequence, the average value of the undesired power can be considered almost constant and, in the time domain, the multipath fading experienced by the inter- ferers does not give appreciable advantages. Instead, when the desired signal falls in a deep fade, the entire packet can be lost (unless a suitable error correcting code is used). Therefore, in the time domain, multipath fading of the desired source is harmful, while multipath fading of the interferers has negligible effects. The maximum angular spread value that has been adopted in this set of simula- tions is obtained using a ring of scatterers having radius d˜ ∼= 1.24 m, which leads ˜ ∼ to a maximum delay between the signal replicas equal to ∆¯τmax = 2d/vc = 8 ns. max 3dB o Therefore, being σˆτ < ∆¯τmax << Ts = 1/R = 1 µs and σˆϕ << ϕ = 36 (Fig. 8.6c), the hypothesis of low-rank channel is largely satisfied. Besides, being d the maximum Doppler spread equal to 69 Hz, the condition f σˆτ < 1, for an underspread channel, is satisfied too. By consequence, the adopted propagation scenario cannot be considered particularly hostile. Despite this fact, the perfor- mance of DWNs using smart antennas are affected by interferer angular spreading (azimuth domain) and desired signal fading (time domain).

8.6 Summary

The results obtained from the discrete-time simulations put into evidence that, in a DWN using smart antennas, the geometries with circular symmetry (UCA, CRA) are more effective for reducing the interference with respect to the periodic configurations (ULA, URA). This aspect is emphasized by the adopted scenario, where the network activity takes place in the azimuth plane, which coincides with the plane where antenna arrays lie. It is not to exclude that, in a three-dimensional scenario, the URA may provide better performance thanks to its planar geometry and its higher number of radiators. However, the main conclusion that can be inferred from the presented investigation is that the better choice for the array geometry of an adaptive antenna is dependent on the network topology. The numerical results show also that a higher throughput and a lower successful packet delay can be obtained when the length of the training sequence is selected 8.6. Summary 167 properly. Its value should guarantee an acceptable overhead as well as an accurate steering and a sufficient depth of the nulls. Finally, the simulations in a mobile scenario confirm that a degradation of the performance can be present even if the propagation environment is not particularly hostile, as it is a low-rank underspread channel.

Part III

Antenna Array Synthesis Techniques

Chapter 9

Exploitation of Spatial Channel Model for Antenna Array Synthesis

This chapter presents a technique to modify the radiation pattern of an antenna array in order to reject interference in a certain angular region. This technique exploits the knowledge of the channel statistic in the azimuth domain to properly choose the position of a certain number of nulls. The method of projections is used to modify the excitation phases in order to generate the antenna array pattern. The presented algorithm requires low Central Processing Unit (CPU) time to perform the synthesis and can be applied to reject multiple undesired sources with different distributions of the DOAs.1

9.1 Introduction

As shown in Section 3.5, a large number of methods that consider the modification of the current excitations in amplitude and phase has been proposed in the litera- ture in order to synthesize the radiation pattern produced by an antenna array to reject interference. However, even if the algorithms that perform both phase and amplitude weighting are able to maximize the SINR at the antenna array output, they need considerable implementation efforts and expensive hardware [138,143]. Besides, from the practical point of view, the synthesis techniques that require only the modification of the excitation phases may be preferable for many systems that are not able to perform amplitude weighting. Therefore, several phase-only algorithms have been developed to synthesize patterns satisfying side-lobe level,

1The content of this chapter is based on M. Comisso and R. Vescovo, “Exploitation of Spatial Channel Model for Antenna Array Synthesis,” Electronics Letters, Vol. 42, No. 19, pp. 1079– 1080, 14th Sep. 2006 [177].

171 172 Chapter 9. Exploitation of Spatial Channel Model for Antenna Array Synthesis beamwidth and null constraints [37–43]. An interesting theoretical analysis of the problem of SINR maximization with equal amplitude constraint is performed in [37], where the author presents two methods for phase-only adaptive nulling. A deterministic approach, suitable for linear arrays, is proposed in [38], where the Taylor expansion of the array factor is used to solve the null synthesis problem. In [39], the authors describe a ge- netic algorithm to modify the phases of a uniform linear array in order to place a certain number of nulls towards the undesired sources, while limiting the pertur- bation on the far-field pattern. A genetic technique is also adopted in [40], where a fast method is proposed to suppress the interference incoming from multiple wide angular regions. Two iterative fast methods, based on the minimization of a non-negative cost function, are described in [41]. Among the large number of possible approaches, a simple and versatile technique to update the array exci- tations is the method of projections [43, 162–165], which can be applied to the problem of phase-amplitude weighting as well as for amplitude-only or phase- only weighting. In the method of projections the synthesis is performed adopting an intersection approach involving proper projection operators that can be defined to satisfy the desired constraints. As widely discussed in Section 2.2, a generic undesired source does not reach the destination from a unique DOA, but from a set of directions distributed in the angular domain. To mitigate the interference in such scenario, the classical approaches perform the array synthesis imposing a global mask [163] or a lo- cal rectangular mask [164], providing a pattern that lies below a given threshold within the interfered region. However, the recent advances in propagation chan- nel modeling provide useful and more precise information regarding the signal statistic in the azimuth domain [19–23]. By consequence, the use of a constant threshold may be unrealistic, resulting in too severe or too weak local constraints. Besides, forming exact nulls in the pattern requires less computational time than imposing an upper bound in an angular region [43, 165]. From these considerations, it would be interesting to develop a computationally efficient algorithm able to exploit the spatial statistic of the channel for interfer- ence suppression purposes. A synthesis technique satisfying these requirements and based on the above cited method of projections is presented in the following of this chapter.

9.2 Problem formulation

With reference to a cartesian system O(x, y, z), the far-field pattern of an antenna array of N elements, in the generic direction of the x − y plane, can be written as 9.3. Projection operators 173 a function of the complex vector of the excitation currents w as:

N X 2π j rk cos(ϕ−ϕk) E(w, ϕ) = wkEk(ϕ)e λ , (9.1) k=1 where, according to the notation of Section 1.3, Ek(ϕ) is the field pattern of the k-th array element, rk and ϕk represent the position of the k-th radiator in polar coordinates. Assuming a mean-square norm ||.||, defined in the space of the array patterns given by (9.1), the problem is the minimization of the distance: Z γb (w) = ||E(w) − E[w(0)]||2 = |E(w, ϕ) − E[w(0), ϕ]|2 dϕ, (9.2)2ג −γb subject to the constraints:

l l l |E(w, ϕ)| ≤ Kl%DOA(ϕ), ∀ϕ : ϕin ≤ ϕ ≤ ϕfin, l = 1, ..., nint, (9.3a)

|wk| = |wk(0)|, k = 1, ..., N, (9.3b)

where E[w(0), ϕ] = E0(ϕ) is the starting pattern (corresponding to iteration number 0), γb is a suitable constant (e.g., γb = π/2 for a linear array, γb = π for a circular array), nint is the number of interferers, Kl is a constant taking into l account the amplitude of the l-th interferer, %DOA(ϕ) is the pdf of the DOA of the l l l-th interferer in the angular region defined by the bounds ϕin and ϕfin.

9.3 Projection operators

The basic idea of the presented method is to substitute the constraint (9.3a) by the constraint: n 0 E(w, ϕl0 ) = 0, l = 1, ..., M, (9.4) P nint with a proper selection of the positions of the M = l=1 Ml nulls, where Ml n denotes the number of nulls employed to suppress the l-th interferer and ϕl0 rep- w) subject to the constraints)2ג resents the l0-th null. The problem of minimizing (9.4) and (9.3b) has been already solved in [43, 166] using the method of projec- tions. In general, a projector P over a closed nonempty subset Θ, included in a Hilbert space U, is defined as: P : u(∈ U) → u˜(∈ Θ) : ||u − u˜|| ≤ ||u − u0||, ∀u0 ∈ Θ. (9.5) Therefore, the projector P identifies the point u˜ = Pu(∈ Θ) nearest to u. If Θ is convex u˜ is unique, while, for nonconvex sets, more than one u˜ may exist. 174 Chapter 9. Exploitation of Spatial Channel Model for Antenna Array Synthesis

In [43], the synthesis process starts from E0(ϕ) and performs a sequence of alter- nate projections onto the sets Θnull and Θmod, containing the patterns satisfying (9.4) and (9.3b), respectively. Defining as ΘAF(⊃ Θmod ∪Θnull) the space of array factors that satisfy (9.1), the pattern at i-th iteration is calculated as:

E[w(i), ϕ] = PmodPnullE[w(i − 1), ϕ], (9.6) where Pmod is the projector from ΘAF onto Θmod, and Pnull is the projector from ΘAF onto Θnull. Moving from the pattern E[w(i−1), ϕ] ∈ ΘAF, corresponding to 1 the (i−1)-th iteration, the projector Pnull identifies an element E[w (i), ϕ] ∈ Θnull that minimizes the distance ||E[w1(i)] − E[w(i − 1)]||2 subject to the constraint (9.4). According to [166], the excitations w1(i) of the pattern obtained using the projector Pnull can be evaluated as:

1 ˜ † ˜ w (i) = [IN − A A]w(i − 1), (9.7)

2π n ˜ ˜ ˜ n j λ rk cos(ϕ 0 −ϕk) ˜ † ˜ H ˜ −1 ˜ H where A = [Al0k], with Al0k = Ek(ϕl0 )e l , and A = (A A) A ˜ is the pseudoinverse of matrix A. The projector Pmod, instead, minimizes the dis- tance ||E[w(i)]−E[w1(i)]||2 subject to the constraint (9.3b), where the excitations w(i) can be calculated as:

j arg[w1(0)] wk(i) = |wk(0)|e k , k = 1, ..., N, (9.8) and arg(.) is the argument function. The distance between the pattern synthesized at the i-th iteration E[w(i)] and the set Θnull gets lower as i increases, leading to deeper nulls in the prescribed directions.

9.4 Exploitation of the spatial channel model

The operations performed by the projector Pnull can be extended in order to im- pose the local masks on the starting pattern. The constraint (9.3a) can be satisfied, for the l-th interferer, by selecting the angular position of the Ml nulls to avoid that the local maxima of the side lobes of the generated pattern overcome the l l l local mask Kl%DOA(ϕ) inside the angular region bounded by ϕin and ϕfin. To simplify the description, it is assumed that the angular regions covered by local masks relative to different interferers are disjoint. However, this hypothesis does not reduce the field of application of the proposed algorithm, because the super- position of two (or more) masks leads simply to a new interference mask with a modified shape. Besides, to improve the readability of the presented expressions, n the position of a generic null is indicated by ϕ . This notation identifies the ql -th l,ql null relative to the l-th interferer. The subindex l accounts for the fact that Ml is, 9.4. Exploitation of the spatial channel model 175 in general, different for each interferer and so the terms ϕn cannot be arranged in l,ql a rectangular matrix. According to this notation and to the hypothesis of disjoint masks, the nulls can be ordered as:

−π ≤ϕn <...<ϕn <...<ϕn <ϕn <...<ϕn <...<ϕn ≤π. (9.9) 1,1 1,q1 1,M1 2,1 l,ql nint,Mnint

The position of the Ml nulls required to suppress the l-th interferer can be evalu- ated from the following system of Ml equations:

 Z n ϕl,1  l 1  %DOA(ϕ)dϕ =  ϕl Ml + 1  in   Z n  ϕl,2  l 1  %DOA(ϕ)dϕ =  n Ml + 1  ϕl,1 (9.10)   .   .   .  Z ϕn  l,M  l l 1  %DOA(ϕ)dϕ = ϕn Ml + 1 l,Ml−1

Z l ϕfin l Remembering that %DOA(ϕ)dϕ = 1, (9.10) provides the position of the nulls l ϕin in order to obtain regions of equal area below the pdf. Being the pdf the derivative of the cumulative distribution function (cdf), this is equivalent to subdividing the azimuth domain of the interference in equal probability regions. This leads to concentrate the nulls where the interference is stronger and to reduce their number where the interference is weaker. Using the notation introduced in (9.9), the system of M equations that provides the positions of the nulls required to suppress all the nint interferers can be written in compact form as:

Z n ϕl,q l l 1 %DOA(ϕ)dϕ = , ql = 1, ..., Ml , l = 1, ..., nint, (9.11) n Ml + 1 ϕl,q −1 l

n l where ϕl,0 = ϕin is defined for calculation purposes. In general, this system can be numerically solved once the pdfs are known, but for some statistics the position of the nulls can be calculated in closed form. In particular, this is possible, of course, for the uniform density, but also for the widely employed truncated Laplacian pdf as well as for the ring of scatterers distribution in low-rank environment. 176 Chapter 9. Exploitation of Spatial Channel Model for Antenna Array Synthesis

20 30 40 50 60 ϕ(o)

0.07

0.06

0.05

0.04

0.03

Truncated Laplacian pdf 0.02 σˆ 0.01 ϕ

0 ϕ ϕ ϕϕ ϕ ϕ ϕ −3 −2 −1 0 1 2 3

o Figure 9.1: Position of the nulls for M1 = 7 on a Laplacian pdf with σˆϕ = 10 .

n n Assume nint = 1 (M = M1) and ϕ = ϕ to simplify the notation. For the 1,q1 q uniform pdf, the nulls are equally spaced according to: ϕ1 − ϕ1 ϕn = ϕ1 + q fin in , q = 1, ..., M (9.12) q in M + 1 and their displacement is equivalent to the adoption of a rectangular mask [43]. In the more realistic scenario of a truncated Laplacian distribution, the nulls can be 1 1 obtained by substituting (5.7) in (9.10) with ϕin = ϕ0 − π/2 and ϕfin = ϕ0 + π/2. After some manipulations and exploiting the symmetry properties of this pdf, the nulls can be expressed as: · ¸ n σˆϕ 2|q| ϕq = ϕ0 − √ sgn(q) log 1 − , (9.13) 2 (M + 1)γL M − 1 M − 1 for q = − , ..., and M odd, and: 2 2 · ¸ n σˆϕ 2|q| − 1 ϕq = ϕ0 − √ sgn(q) log 1 − , (9.14) 2 (M + 1)γL M M for q = − , ..., −1, 1, ..., and M even, where sgn(.) is the sign function. 2 2 Therefore, for a truncated Laplacian pdf, constraint (9.3a) is replaced by (9.4), 9.5. Numerical results 177

0

−10

−20

−30

−40

dB −50

−60

−70

−80

−90

−100 0 45 90 135 180 ϕ(o)

Figure 9.2: Modified power gain pattern in presence of one interferer with a Lapla- o cian pdf with σˆϕ = 10 . Local mask of the interferer Modified pattern where the nulls are selected according to (9.13) or (9.14). The nulls for the ring of scatterers distribution in a low-rank scenario can be de- 1 1 rived using (2.21), (5.3) and (9.10) with ϕin = ϕ0 − γm1 and ϕfin = ϕ0 + γm1 . Performing some algebra, one can obtain: µ ¶ π 1 ϕn = ϕ + γ sin q + , q = 1, ..., M. (9.15) q 0 m1 M + 1 2 Even if not explicitly addressed in this study, the presented method can be ex- tended to take into account mutual coupling effects by suitably modifying each element pattern Ek(ϕ) in (9.1) [165].

9.5 Numerical results

The first numerical example is obtained for a uniform linear array of N = 28 om- nidirectional elements, with interelement spacing equal to λ/2. The interference 178 Chapter 9. Exploitation of Spatial Channel Model for Antenna Array Synthesis

0

−10

−20

−30

−40

−50 dB

−60

−70

−80

−90

−100 −150 −100 −50 0 50 100 150 ϕ(o)

Figure 9.3: Modified power gain pattern in presence of two interferers: the first o with a Gaussian pdf with σˆϕ1 = 12 , and the second with a Laplacian pdf with o σˆϕ2 = 8 . Global mask for the starting pattern Local masks of the interferers Modified pattern

o scenario involves a unique undesired source around the mean DOA ϕ0 = 40 that is suppressed using M1 = 7 nulls and choosing as starting point a 40 dB Cheby- shev pattern. The nulls are placed according to (9.13) and the angular spread is chosen equal to 10o (Fig. 9.1). The power gain pattern G(ϕ) = |E(w, ϕ)|2 is reported in Fig. 9.2. The figure shows that the lobes in the null region are shaped according to the local mask (dashed line). The second example is obtained using a UCA of N = 30 omnidirectional ele- ments, having radius equal to ρc = 1.8λ. The starting pattern is calculated by ap- proximating a global mask (dash-dotted line) in the mean square sense, according to the method presented in [167]. This example involves two regions of interfer- o o ence, the former having a Gaussian pdf with σˆϕ1 = 12 around ϕ01 = −110 , o o and the latter having a Laplacian pdf with σˆϕ2 = 8 around ϕ02 = 100 . Fig. 9.3 shows the modified pattern, obtained employing M1 = M2 = 5 nulls to shape each region. The results reveal that the proposed technique can be employed to 9.6. Considerations and summary 179

0

−10

−20

−30

−40

−50 dB

−60

−70

−80

−90

−100 −150 −100 −50 0 50 100 150 ϕ(o)

Figure 9.4: Modified power gain pattern in presence of two interferers both having o a DOA statistic corresponding to the ring of scatterers with σˆϕ1 = 12 and σˆϕ2 = 8o. Local masks of the interferers Modified pattern simultaneously reject the interference incoming from regions with different statis- tics. In this case, the positions of the five nulls for the Gaussian pdf are evaluated by numerically solving (9.10). The third example is obtained using the same parameters of the previous one, ex- cept for the pdfs of the interferers. The statistic of the first undesired source is chosen according to the ring of scatterers model and the corresponding nulls are evaluated using (9.15), while a uniform distribution is selected for the second in- terferer and the nulls are calculated from (9.12). The synthesized pattern, shown in Fig. 9.4, confirms that, adopting the presented method, the minor lobes can be shaped according to the local masks by controlling the density of the nulls as a function of the statistics of the interferers.

9.6 Considerations and summary

It can be noticed that the requirement at the boundaries of the dashed masks is dif- ficult to satisfy. However, these boundaries correspond to the regions with lower 180 Chapter 9. Exploitation of Spatial Channel Model for Antenna Array Synthesis probability of incoming interference, while the regions with larger probability are effectively suppressed. An interesting advantage of the presented synthesis tech- nique is related to the CPU time required to obtain the patterns. In particular, in the first example the excitation phases are calculated in approximately 0.91 seconds, while in the second and in the third example they are calculated in approximately 2.32 seconds. These times are obtained using a common laptop equipped with an Intel Pentium 4 processor at 2.8 GHz. Therefore, the presented method represents a fast technique to reject interference exploiting the channel statistic in the angular domain. This technique, based on the method of projections, performs the local shaping of the pattern by phase-only control. Besides, adopting antenna arrays with a sufficient number of elements, the method can be used to suppress multiple undesired sources spread over wide angular regions and with different statistical distributions. Chapter 10

Multi-Beam and Null Synthesis of Antenna Arrays by Phase-Only Control

This chapter presents an iterative method for the synthesis of the radiation pat- tern produced by an antenna array of arbitrary geometry. By modifying only the excitation phases, the method is able to produce patterns with multiple prescribed main lobes and nulls, while limiting the side-lobe level. The technique is based on the minimization of a weighted cost function that takes into account multiple objectives. The presented algorithm can be easily implemented and requires a low CPU time to perform the pattern synthesis.1

10.1 Introduction and problem formulation

As discussed in the previous chapters, the recent adoption of the SDMA technique in several communication systems has increased the interest of the research com- munity in the development of fast and efficient beamforming algorithms. These algorithms must be able to produce radiation patterns with multiple main lobes and multiple prescribed nulls, and, for some practical applications, should be able to perform the synthesis by controlling the sole phases of the current excitations. Among the large number of available phase-only techniques, the solutions that produce patterns with multiple main lobes are usually developed for arrays hav- ing a large number of radiators [168–169]. Recently, a phase-only method able to

1The content of this chapter is based on M. Comisso and R. Vescovo, “Multi-Beam Synthesis with Null Constraints by Phase Control for Antenna Arrays of Arbitrary Geometry,” Electronics Letters, Vol. 43, No. 7, pp. 374–375, 29th Mar. 2007 [178].

181 182 Chapter 10. Multi-Beam and Null Synthesis of Antenna Arrays by Phase-Only Control perform multi-beam synthesis as well as null steering, and suitable for arrays with few elements, has been proposed in [42]. This technique, which enables SDMA in wireless communication networks, is based on Sequential Quadratic Program- ming (SQP) algorithm and is applied to ULAs. This chapter presents a phase-only synthesis method, able to produce patterns with multiple prescribed main lobes and nulls, which can be applied to antenna arrays of arbitrary geometry. The analyzed problem can be formulated as follows. According to the reference system and the notation described in Section 9.2, the far-field pattern of an antenna array of N elements can be written as: XN ˜ E(w, ϕ) = wkfk(ϕ), (10.1) k=1

2π ˜ j rk cos(ϕ−ϕk) where fk(ϕ) = Ek(ϕ)e λ . The objective is to solve the following syn- thesis problem. Determine an array pattern E(w, ϕ) such that:

• n ϕd, ..., ϕd , des maxima are placed in the positions 1 ndes (10.2a) • n ϕn, ..., ϕn , int nulls are placed in the positions 1 nint (10.2b) • the gain is as low as possible in the other directions, (10.2c) • all the excitation currents have equal amplitude, so it can be (10.2d) assumed |w1| = |w2| = ... = |wN | = 1 without loss of generality.

10.2 Synthesis technique

In order to satisfy the requirements (10.2), it is proposed to minimize the following weighted cost function:

Xndes ¯ ¯ 2 ¯ d ¯2 i (w) , − gl E(w, ϕl ) l=1 Xndes ¯ ¯ ¯ d d ¯2 + gndes+1 E(w, ϕl ) − E(w, ϕl0 ) l,l0=1 (10.3) Xnint n 2 + gndes+2 |E(w, ϕl )| l=1 2 + gndes+3 kE(w)k , where the real non-negative numbers gl represent the weights of the cost function and can be joined in the vector g = [g1, ..., gndes , gndes+1, gndes+2, gndes+3]. The 10.2. Synthesis technique 183 squared norm kE(w)k2 = hE(w),E(w)i is defined adopting the scalar product: Z γb ˜ ˜ ˜ ˜∗ hfk, fk0 i = fk(ϕ)fk0 (ϕ)dϕ, (10.4) −γb where, as described in Section 9.2, γb represents a constant dependent on the array geometry. The first summation in (10.3) has the aim of forming the ndes required maxima (constraint (10.2a)), the second summation imposes that the difference between the different maxima be sufficiently low, while the third and the fourth summations impose conditions (10.2b) and (10.2c), respectively. Using (10.1) and (10.4), after some manipulations the cost function can be rewritten as: " # XN Xndes 2 ∗ ˜ d ˜∗ d i (w) = wkwk0 − glfk(ϕl )fk0 (ϕl ) 0 k,k =1 | l=1 {z } des Z 0 ( k k ) N n X Xdes h i h i∗ ∗ d d d d ˜ ˜ ˜ 0 ˜ 0 + wkwk0 gndes+1 fk(ϕl )−fk(ϕl0 ) · fk (ϕl )−fk (ϕl0 ) k,k0=1 l,l0=1 | {z } des Z˜ 0 " #k k XN Xnint ∗ ˜ n ˜∗ n + wkwk0 gndes+2 fk(ϕl )fk0 (ϕl ) 0 k,k =1 | l=1 {z } int Zk0k N · Z ¸ X γb ∗ ˜ ˜∗ + wkwk0 gndes+3 fk(ϕ)fk0 (ϕ)dϕ k,k0=1 | −γb {z } SLL Zk0k XN ∗ = wkwk0 Zk0k, k,k0=1 (10.5)

des ˜des int SLL where Zk0k = Zk0k +Zk0k +Zk0k +Zk0k . Imposing the equal amplitude constraint jφk in (10.2d), the excitation currents can be written as wk = e , where φk represents the excitation phase of the k-th array element. By consequence, (10.5) can be expressed as: XN 2 j(φk−φ 0 ) i (Φ) = e k Zk0k, (10.6) k,k0=1 184 Chapter 10. Multi-Beam and Null Synthesis of Antenna Arrays by Phase-Only Control

des des ˜ des ˜des int where Φ = [φ1, ..., φN ]. As the matrices Z = [Zk0k ], Z = [Zk0k ], Z = int SLL SLL [Zk0k], Z = [Zk0k ] are Hermitian, also the matrix Z = [Zk0k] is Hermitian, that ∗ 2 is, Zkk0 = Zk0k. Therefore, i (Φ) becomes: XN Xk−1 2 i (Φ) = tr(Z) + 2 |Zk0k| cos(φk − φk0 + βk0k), (10.7) k=2 k0=1 PN where tr(Z) = k=1 Zkk is the trace of matrix Z and βk0k = arg(Zk0k). The function i2(Φ) can be minimized following the Single Coordinate Method (SCM) [41], which performs the minimization by evaluating the unknown phases sequen- tially. Putting into evidence the dependence from the generic phase φk˜, (10.7) can be written as: Xk˜−1 2 i (Φ) =tr(Z) + 2 |Zk0k˜| cos(φk˜ − φk0 + βk0k˜)+ k0=1 XN (10.8) + 2 |Zkk˜ | cos(φk − φk˜ + βkk˜ )+ k=k˜+1

+ z(φ1, ..., φk˜−1, φk˜+1, ..., φN ), where z(φ1, ..., φk˜−1, φk˜+1, ..., φN ) is a term independent of φk˜. Performing some manipulations, (10.8) can be expressed as: XN 2 i (Φ) =tr(Z) + 2 |Zkk˜| cos(φk˜ − φk + βkk˜)+ k=1 (10.9) k6=k˜

+ z(φ1, ..., φk˜−1, φk˜+1, ..., φN ), and, for calculation purposes, rearranged as: q 2 2 2 i (Φ) =tr(Z) + B + C cos(φ˜ − φ˜˜)+ k˜ k˜ k k (10.10) + z(φ1, ..., φk˜−1, φk˜+1, ..., φN ), where: XN Bk˜ = 2 |Zkk˜| cos (φk − βkk˜), (10.11a) k=1 k6=k˜ XN Ck˜ = 2 |Zkk˜| sin (φk − βkk˜), (10.11b) k=1 k6=k˜ ˜ φk˜ = arg(Bk˜ + jCk˜). (10.11c) 10.3. Numerical results 185

0

−10

−20

−30

dB −40

−50

−60

−70

−80 −90 −45 0 45 90 ϕ (o)

d o Figure 10.1: Power pattern synthesized imposing a single maximum (ϕ1 = −40 ) n o and a null (ϕ1 = 15 ) using a ULA with N = 10 elements. SQP method using the excitation phases reported in [42] Presented method with g = [1, 0, 300, 1]

2 The minimum of i (Φ), as a function of φk˜, is obtained for: ˜ φk˜ = π + φk˜. (10.12) At each step, the process is applied sequentially from k˜ = 2 to k˜ = N in order to update all the excitation phases. The phase φ1 is assumed as the reference phase and its value is set to zero.

10.3 Numerical results

The first numerical example refers to a ULA of N = 10 omnidirectional ele- ments spaced by half wavelength. Imposing a maximum and a null, the proposed technique yields the pattern in Fig. 10.1 (solid line), which is compared to the pattern synthesized using the method described in [42]. This second method uses an SQP algorithm to form maxima and nulls in the pattern of a linear equispaced array. The pattern synthesized using the technique developed in this study shows a 186 Chapter 10. Multi-Beam and Null Synthesis of Antenna Arrays by Phase-Only Control

0

−10

−20

−30

dB −40

−50

−60

−70

−80 −90 −45 0 45 90 ϕ (o)

d o Figure 10.2: Power pattern synthesized imposing ndes = 2 maxima (ϕ1 = −20 , d o n o ϕ2 = 40 ) and a null (ϕ1 = −60 ) using a ULA with N = 10 elements. SQP method using the excitation phases reported in [42] Presented method with g = [100, 100, 7, 300, 1]

slightly lower side-lobe level in a large part of the azimuth domain with respect to the pattern derived in [42] for the same scenario. Using the presented method, the

Array element Fig. 10.1 Fig. 10.2 Fig. 10.3 1 0o 0o 0o 2 -243.3967o -25.7247o 1.8244o 3 215.5292o -233.9255o -117.9702o 4 350.5718o 99.6922o -86.8239o 5 -274.3827o -108.3332o 21.9544o 6 -133.7257o -134.1755o 37.0313o 7 323.2568o 17.7391o -72.9026o 8 -264.3266o 351.3101o -75.5418o 9 195.8742o -216.6999o - 10 313.8894o 117.4412o -

TABLE 10.1: EXCITATION PHASES OBTAINED BY THE PRESENTED METHOD. 10.3. Numerical results 187

0

−10

−20

−30

dB −40

−50

−60

−70

−80 −90 −45 0 45 90 ϕ (o)

d o Figure 10.3: Power pattern synthesized imposing ndes = 3 maxima(ϕ1 = −32 , d o d o n o ϕ2 = 2 , ϕ3 = 22 ) and a null (ϕ1 = −14 ) using a ULA with N = 8 elements. SQP method Presented method with g = [173, 115, 115, 23, 110000, 750]

null objective is reached imposing a sufficiently large value for the corresponding weight. The second example refers to the same array and is obtained imposing ndes = 2 maxima and a single null (Fig. 10.2). It can be noticed that, employing the proposed algorithm, a deep null can be exactly placed in the required direction. Both methods perform satisfactorily when ndes = 3 maxima and a single null are imposed adopting a ULA with N = 8 antenna elements (Fig. 10.3). This third example exploits the possibility, provided by the adopted cost function, to assign different values to the weights corresponding to the three required maxima. The patterns in Fig. 10.1 and Fig. 10.2 (dashed lines) have been derived using the excitation phases that can be found in [42], while the pattern in Fig. 10.3 (dashed line) has been derived employing the function fgoalattain, which implements the SQP approach and is included in the Matlab optimization tool- box. The excitation phases obtained employing the technique presented in this chapter are given in Table 10.1 for the three synthesized patterns (solid lines). A comparison with the phase values reported in [42] shows a noticeable difference for the first considered scenario, probably due to the imprecise steering of the null. 188 Chapter 10. Multi-Beam and Null Synthesis of Antenna Arrays by Phase-Only Control

0

−10

−20

−30

−40 dB

−50

−60

−70

−80 −150 −100 −50 0 50 100 150 ϕ (o)

d o Figure 10.4: Power pattern synthesized imposing ndes = 2 maxima (ϕ1 = −125 , d o n o n o n o n o ϕ2 = 0 ) and nint = 4 nulls (ϕ1 = −50 , ϕ2 = 40 , ϕ3 = 90 , ϕ4 = 110 ) using a UCA with N = 30 elements and employing the presented method with g = [10, 10, 7, 25000, 1].

Previous examples were referred to ULAs in presence of a unique interferer. How- ever, the proposed algorithm can be applied to antenna arrays of arbitrary geom- etry when multiple main lobes and multiple nulls must be imposed. As a fourth example, a pattern with ndes = 2 maxima and nint = 4 nulls is synthesized using a UCA with N = 30 equispaced omnidirectional elements and radius ρc = 1.8λ (Fig. 10.4). The figure confirms that the adopted technique is able to perform

0 0.5 1 1.5 2 2.5 3 3.5 r ( λ) k

Figure 10.5: Generalized CLA array with N = 32 elements. 10.3. Numerical results 189

0

−10

−20

−30

dB −40

−50

−60

−70

−80 −90 −45 0 45 90 ϕ (o)

d o Figure 10.6: Power pattern synthesized imposing a maximum (ϕ1 = 0 ) and n o n o nint = 2 nulls (ϕ1 = −60 , ϕ2 = 60 ) using the CLA in Fig. 10.5 with N = 32 elements and employing the presented method with g = [1, 0, 3000, 5].

SDMA together with multiple interferers cancellation by phase-only control.

Using the presented technique, the weight regarding the SLL constraint (gndes+3 in (10.3)) is usually kept low to reach the more stringent objectives regarding the maxima and the nulls, thus obtaining high side-lobe levels. This drawback can be mitigated by a proper choice of the array geometry. For an N elements uniform linear array, a low side-lobe level pattern can be synthesized adopting a binomial distribution of the excitation amplitudes (binomial array). However, this tech- nique is really sensitive to small errors in the feeding network, which may lead to distorted patterns [3]. Recent studies on arrays show that a low side-lobe level can be obtained by employing the generalized Cantor dust with a uniform distribution of the excitation amplitudes [170]. A fifth example is ob- tained using a Cantor Linear Array (CLA) of N = 32 elements, having a scaling factor equal to 1.52 and a total length equal to 3.875λ (Fig. 10.5). The mutual cou- pling effect has not been considered, but it can be taken into account by suitably modifying the element patterns Ek(ϕ) in (10.1) [165]. Fig. 10.6 shows the pattern synthesized by using the proposed algorithm, and imposing a maximum and two symmetric nulls. It can be noticed that, while reaching the objective regarding the 190 Chapter 10. Multi-Beam and Null Synthesis of Antenna Arrays by Phase-Only Control

Scenario CPU time (s) Fig. 10.1 0.24 Fig. 10.2 0.11 Fig. 10.3 0.32 Fig. 10.4 3.79 Fig. 10.6 2.47

TABLE 10.2: CPU TIMES REQUIRED TO SYNTHESIZE THE PATTERNS. nulls, the side-lobe level is lower than -30 dB. A further advantage of the presented solution is related to the computational bur- den necessary to synthesize the pattern. In fact, the proposed method is quite simple and requires low CPU time (Table 10.2). Besides, only few lines of code are necessary to implement the algorithm. In particular, the fast convergence of the proposed technique is directly related to the simple closed form computation of the phases that is performed at each iteration.

10.4 Setting of the weights

From the considered examples it can be observed that, even if the presented method requires the selection of ndes+3 weights for the cost function, a proper choice of such weights can be performed in few attempts by following some prac- tical rules. In particular, the value of the weight corresponding to the nulls should be selected some orders of magnitude larger than the values of the other weights, in order to avoid possible shifts of the null positions. The adoption of different weights for different maxima becomes useful when the constraints are difficult to satisfy. In the third presented example (Fig. 10.3) four constraints (ndes = 3 maxima and a null) have been imposed using an antenna array having only eight elements. In such a scenario the weight vector of the cost function g must be carefully selected because the number of degrees of freedom that is available is low. However, mutually equal values can be usually assigned to the ndes weights corresponding to the maxima, thus simplifying the use of the algorithm. Chapter 11

Conclusions

This thesis has discussed the considerable performance improvement that can be achieved adopting multi-antenna systems as well as the degradation due to the propagation environment, proposing computationally efficient solutions for syn- thesizing the radiation pattern produced by an antenna array. The presented mathematical model confirms that adaptive antennas are able to sus- tain a larger number of simultaneous communications with respect to directional and switched-beam techniques. However, as compared to the omnidirectional an- tenna case, even the use of less complex multi-antenna systems can guarantee con- siderable performance improvements, with the additional advantage related to the lower costs for the electronic components and the implementation. In this context, the synthesis techniques described in this study represent two examples of compu- tationally efficient solutions to perform beamforming operations employing cheap phase shifters. The two algorithms are designed satisfying two fundamental re- quirements of today’s communication systems: the suppression of the interference and the increase of the capacity. These objectives are obtained, in the first case, exploiting the increased knowledge of the spatial channel characteristics, and, in the second case, enabling the possibility to have multiple main lobes for spatial multiplexing operations. Differently from a MIMO channel, in a low-rank environment multipath effects can be hardly exploited to improve the network or the single link capacity. This leads to an unavoidable degradation of the performance that can be mitigated by adopting proper countermeasures at MAC and PHY layers. The choice of the an- tenna array geometry, which may be dictated by encumbrance constraints, should be performed according to an efficient use of the available space on the device. The configurations having a circular symmetry show a larger versatility over the network topology and the angular spreading of the channel, as compared to the geometries characterized by a periodic displacement of the antenna elements. The large potential offered by the antenna system at physical layer, independently

191 192 Chapter 11. Conclusions of its level of sophistication, can be quantified by the signal to interference plus noise ratio at the single node or by the number of sustainable links of the en- tire network. However, this potential may remain underutilized without a proper modification of the upper layers of the protocol stack. The results obtained in this thesis for a distributed wireless network prove that, at MAC layer, the theoreti- cally available number of simultaneous communications determines a significant growth of the aggregate throughput only if the 802.11 DCF parameters are care- fully selected and novel proper mechanisms, such as the directional virtual carrier sensing, are introduced. Radical modifications of the 802.11 access scheme, in- stead, may lead to problems of backward compatibility with the current versions of the already diffused standard. The analysis confirms the key role played by the minimum contention window, which must be set to a value able to force the coexistence of concurrent communications in order to increase the forwarded and the delivered load, while reducing the drop probability and the successful packet delay. In the field of network modeling, an objective for future work is given by the extension of the presented mathematical framework to the 802.11e amendment. This theoretical improvement may be useful to investigate the quality of service issues in presence of multi-antenna systems. Further studies can be performed to explore adaptive solutions for the setting of the minimum contention window, which should be able to take into account the number of nodes, the angular spread and the spatial channel model. Finally, in the context of antenna array pattern synthesis, an interesting aspect to analyze may be the possibility to improve the performance of the presented algorithms adopting a power synthesis approach, in which constraints on the phase of the synthesized pattern are absent. Appendix

Smart DATA transmission cases

This Appendix reports the complete equation for evaluating the number of sus- tainable links of a DWN using adaptive antennas in the SD cases for Lmax ≥ N/2 (Chapter 5). The coefficients of the equation are obtained for a uniform distri- bution of the nodes and assuming a two-ray ground propagation model for the path-loss. The expressions are written in compact form and are valid for the om- nidirectional and for the directional CTS transmission. For α = 4, (5.36) and (5.40) become:

µ ¶ R 2 K = 1 − c , (11.1a) Rt ¯ 1 K = 2 , (11.1b) 4Rc 1 α = − , (11.1c) 1 2 1 α = . (11.1d) 2 2

Inserting (5.45) for Lmax ≥ N/2 in (5.19) and (5.35) for the OCTS case (or in (5.39) for the DCTS the case), (5.27) becomes a sixth degree equation:

X6 0 i ciLmax = 0. (11.2) i=0

The exact number of sustainable links for a uniform distribution of the nodes in the SD cases is given by the largest root of (11.2). The expressions that describe

193 194 Appendix A. Smart DATA transmission cases

0 the coefficients ci can be written as:

0 2 c0 =4˜c6, (11.3a)

0 c1 =4˜c6[˜c5c˜7 − 2(2˜c6 − c˜1)], (11.3b)

0 2 2 c2 =4[(2˜c6 − c˜1) +c ˜5c˜6(˜c8 − c˜7) + 2˜c6(˜c6 − 2˜c1)] + (˜c5c˜7) + 2 (11.3c) − 2[2˜c6(˜c3 +c ˜5) − 2˜c1c˜5 − c˜4]˜c7,

0 2 2 c =2[2˜c6(˜c3 +c ˜5) − 2˜c1c˜5 − c˜ ](˜c7 − c˜8) + 16[(˜c1 +c ˜6) +c ˜1c˜6]+ 3 4 (11.3d) + 4[(˜c3c˜6 − c˜1c˜3 − c˜1c˜5 +c ˜2c˜4)˜c7 − c˜5c˜6c˜8] − 2˜c5c˜7(˜c3c˜7 − c˜5c˜8),

0 2 2 c4 =(˜c3c˜7 − c˜5c˜8) + 2{c˜8[2(˜c3c˜6 +c ˜5c˜6 − c˜1c˜5) − c˜4 − c˜3c˜5c˜7]+ 2 +c ˜7(2˜c1c˜3 +c ˜2) − 2[(˜c3c˜6 − c˜1c˜3 − c˜1c˜5 +c ˜2c˜4)(˜c7 − c˜8)+ (11.3e) 2 2 − 6˜c1 − c˜6 + 8˜c1c˜6]},

0 2 c =2[˜c3c˜8(˜c3c˜7 − c˜5c˜8) + (2˜c1c˜3 +c ˜ )(˜c8 − c˜7)] + 8˜c1(˜c6 − 2˜c1)+ 5 2 (11.3f) − 4(˜c3c˜6 − c˜1c˜3 − c˜1c˜5 +c ˜2c˜4)˜c8,

0 2 2 c6 =(2˜c1 − c˜3c˜8) − 2˜c2c˜8, (11.)

where the constants c˜i have the following meaning:

2 4 c˜1 = 2SINRthRc RsdGtx1 χ˜1, (11.4a) 2 4 ¯ 0 c˜2 = 2SINRthRc RsdGtx1 Kχ˜3, (11.4b) 2 4 ¯ 00 c˜3 = 2SINRthRc RsdGtx1 Kχ˜3, (11.4c) c˜ = SINR R2R4 K¯ [(N − 2)G χ˜0 − Nχ˜0 ], (11.4d) 4 th c sd ( n 2 3 Nχ˜00 − 2π(N − 2)G for OCTS case c˜ = SINR R2R4 K¯ · 3 n , 5 th c sd 0 0 (11.4e) Nχ˜3 − (N − 2)Gnχ˜2 for DCTS case 4 4 c˜6 = π(Rsd − Rc GdGd), (11.4f) 0 c˜7 = (N − 2)Gn − NGm, (11.4g) 0 c˜8 = 2Gm, (11.4h) Appendix A. Smart DATA transmission cases 195

with:

 Z 2π  ¯ KK FD(ϕ)dϕ for OCTS case  0 χ˜ = , (11.5a) 1  Z  2π © ª  ¯ −1/2 K [FD(ϕ)] + K − 1 FD(ϕ)dϕ for DCTS case 0 Z 2π 0 −1/2 χ˜2 = [FD(ϕ)] dϕ, (11.5b) 0 Z 2π 0 1/2 χ˜3 = [FD(ϕ)] dϕ, (11.5c) 0 Z 2π   FD(ϕ)dϕ for OCTS case  0 00 χ˜3 = . (11.5d) Z 2π  1/2  [FD(ϕ)] dϕ for DCTS case 0

Bibliography

[1] J.D. Jackson, Classical Electrodynamics. New York, John Wiley and Sons, 1962. [2] IEEE Standard Definitions of Terms for Antennas, IEEE Std 145-1993 (Re- vision of IEEE Std 145-1983), IEEE Antennas and Propagation Society, Jun. 1993. [3] C.A. Balanis, Antenna Theory: Analysis and Design. New York, John Wiley and Sons, 1997. [4] B. Allen and M. Ghavami, Adaptive Array Systems. New York, John Wiley and Sons, 2005. [5] F. Gross, Smart Antennas for Wireless Communications with Matlab. New York, McGraw-Hill, 2005. [6] P. Ioannides and C.A. Balanis, “Uniform Circular Arrays for Smart An- tennas,” IEEE Antennas and Propagation Magazine, vol. 47, no. 4, pp. 192–206, Aug. 2005. [7] ——, “Uniform Circular and Rectangular Arrays for Adaptive Beamform- ing Applications,” IEEE Antennas and Wireless Propagation Letters, vol. 4, pp. 351–354, 2005. [8] T. Haruyama, N. Kojima, I. Chiba, Y. Oh-Hashi, N. Orime and T. Katagi, “Conformal Array Antenna with Digital Beam Forming Network,” in IEEE Antennas and Propagation Society International Symposium (APS), vol. 2, 26-30 Jun. 1989, pp. 982–985. [9] W.H. Kummer, “Basic Array Theory,” Proceedings of the IEEE, vol. 80, no. 1, pp. 127–140, 1992. [10] R. Vescovo, “Use of Directional Elements in the Null Synthesis for Arc Ar- rays,” in IEEE Antennas and Propagation Society International Symposium (APS), vol. 2, 21-26 Jun. 1998, pp. 736–739.

197 198 Bibliography

[11] W. Jakes, Microwave Mobile Communications. IEEE Press, 1974.

[12] G.L. Stuber, Principles of Mobile Communication. Norwell. MA, Kluwer Academic Pubblishers, 1996.

[13] E. Biglieri, J. Proakis and S. Shamai, “Fading Channels: Information- Theoretic and Communications Aspects,” IEEE Transactions on Informa- tion Theory, vol. 44, no. 6, pp. 2619–2692, Oct. 1998.

[14] D. Chizhik, J. Ling, P.W. Wolniansky, R.A. Valenzuela, N. Costa and K. Huber, “Multiple-Input-Multiple-Output Measurements and Modeling in Manhattan,” IEEE Journal on Selected Areas in Communications, vol. 21, no. 3, pp. 321–331, Apr. 2003.

[15] J. Fuhl, A.F. Molisch and E. Bonek, “Unified Channel Model for Mobile Radio Systems with Smart Antennas,” IEE Proceedings on Radar, Sonar and Navigation, vol. 145, no. 1, pp. 32–40, Feb. 1998.

[16] R.B. Ertel, P. Cardieri, K.W. Sowerby, T.S. Rappaport and J.H. Reed, “Overview of Spatial Channel Models for Antenna Array Communication Systems,” IEEE Personal Communications, vol. 5, no. 1, pp. 10–22, Feb. 1998.

[17] R. Kohno, “Spatial and Temporal Communication Theory Using Adaptive Antenna Array,” IEEE Personal Communications, vol. 5, no. 1, pp. 28–35, Feb. 1998.

[18] J. Salz and J.H. Winters, “Effect of Fading Correlation on Adaptive Ar- rays in Digital Mobile Radio,” IEEE Transactions on Vehicular Technology, vol. 43, no. 4, pp. 1049–1057, Nov. 1994.

[19] W.C.Y. Lee, “Effects on Correlation between Two Mobile Radio Base- Station Antennas,” IEEE Transactions on Communications, vol. 21, no. 11, pp. 1214–1224, Nov. 1973.

[20] M.T. Feeney and J.D. Parsons, “Cross-Correlation between 900 MHz Sig- nals Received on Vertically Separated Antennas in Small-Cell Mobile Ra- dio Systems,” IEE Proceedings on Communications, Speech and Vision, vol. 138, no. 2, pp. 81–86, Apr. 1991.

[21] T.L. Fulghum, K.J. Molnar and A.D. Hallen, “The Jakes Fading Model for Antenna Arrays Incorporating Azimuth Spread,” IEEE Transactions on Vehicular Technology, vol. 51, no. 5, pp. 968–977, 11th Sep. 2002. Bibliography 199

[22] P. Petrus, J.H. Reed and T.S. Rappaport, “Geometrical-Based Statistical Macrocell Channel Model for Mobile Environments,” IEEE Transactions on Communications, vol. 50, no. 3, pp. 495–502, Mar. 2002. [23] K.I. Pedersen, P.E. Mogensen and B.H. Fleury, “A Stochastic Model of the Temporal and Azimuthal Dispersion Seen at the Base Station in Outdoor Propagation Environments,” IEEE Transactions on Vehicular Technology, vol. 49, no. 2, pp. 437–447, Mar. 2000. [24] A.D. Kucar, “Mobile Radio: An Overview,” IEEE Communications Mag- azine, vol. 29, no. 11, pp. 72–85, Nov. 1991. [25] P.H. Lehne and M. Pettersen, “An Overview of Smart Antenna Technol- ogy for Mobile Heterogeneous Networks,” IEEE Communications Surveys, vol. 2, no. 4, pp. 14–23, Fourth Quarter 1999. [26] IEEE Standard for Wireless LAN Medium Access Control (MAC) and PHYsical Layer (PHY) Specifications: Amendment: Medium Ac- cess Control (MAC) Enhancements for Higher Throughput, IEEE Std 802.11n/D1.07, Dec. 2006. [27] A. Alexiou and M. Haardt, “Smart Antenna Technologies for Future Wire- less Systems: Trends and Challenges,” IEEE Communications Magazine, vol. 42, no. 9, pp. 90–97, Sep. 2004. [28] E. Falletti, “Applications of Adaptive Antennas in the Field of Third and Fourth Generation Wireless Communication Systems,” Ph.D. dissertation, Politecnico di Torino (Italy), Dec. 2003. [29] G.J. Foschini and M.J. Gans, “On Limits of Wireless Communications in a Fading Environment when Using Multiple Antennas,” Wireless Personal Commununications, vol. 6, no. 3, pp. 311–335, Mar. 1998. [30] O. Oyman, R.U. Nabar, H. Bolcskei and A.J. Paulraj, “Tight Lower Bounds on the Ergodic Capacity of Rayleigh Fading MIMO Channels,” in IEEE Global Telecommunications Conference (GLOBECOM), vol. 2, 17-21 Nov. 2002, pp. 1172–1176. [31] D. Chizhik, G.J. Foschini and R.A. Valenzuela, “Capacities of Multi- Element Transmit and Receive Antennas: Correlations and Keyholes,” Electronics Letters, vol. 36, no. 13, pp. 1099–1100, 22nd Jun. 2000. [32] B. Holter, “On the Capacity of the MIMO Channel: A Tutorial Introduc- tion,” in IEEE Norwegian Symposium on Signal Processing (NORSIG), 18–20 Oct. 2001, pp. 167—-172. 200 Bibliography

[33] S.M. Alamouti, “A Simple Transmit Diversity Technique for Wireless Communications,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 8, pp. 1451–1458, Oct. 1998. [34] V. Tarokh, A. Naguib, N. Seshadri and A.R. Calderbank, “Combined Array Processing and Space–Time Coding,” IEEE Transactions on Information Theory, vol. 45, no. 4, pp. 1121–1128, May 1999. [35] L. Zheng and D.N.C. Tse, “Diversity and Multiplexing: A Fundamental Tradeoff in Multiple-Antenna Channels,” IEEE Transactions on Informa- tion Theory, vol. 49, no. 5, pp. 1073–1096, May 2003. [36] L.C. Godara, “Application of Antenna Arrays to Mobile Communications, Part II: Beam Forming and Direction-of-Arrival Considerations,” Proceed- ings of the IEEE, vol. 85, no. 8, pp. 1193–1245, Aug. 1997. [37] S.T. Smith, “Optimum Phase-Only Adaptive Nulling,” IEEE Transactions on Signal Processing, vol. 47, no. 7, pp. 1835–1843, Jul. 1999. [38] H. Steyskal, “Simple Method for Pattern Nulling by Phase Perturbation,” IEEE Transactions on Antennas and Propagation, vol. 31, no. 1, pp. 163– 166, Jan. 1983. [39] R.L. Haupt, “Phase-Only Adaptive Nulling with a Genetic Algorithm,” IEEE Transactions on Antennas and Propagation, vol. 45, no. 6, pp. 1009– 1015, Jun. 1997. [40] D. I. Abu-Al-Nadi, M. J. Mismar and T. H. Ismail, “Genetically Evolved Phase-Aggregation Technique for Linear Arrays Control,” Progress in Electromagnetics Research, PIER 43, pp. 287–304, 2003. [41] A.D. Khzmalyan and A.S. Kondrat’yev, “Fast Iterative Methods for Phase- Only Synthesis of Antenna Array Pattern Nulls,” Electronics Letters, vol. 31, no. 8, pp. 601–602, 13th Apr. 1995. [42] M. Mouhamadou, P. Vaudon and M. Rammal, “Smart Antenna Array Pat- terns Synthesis: Null Steering and Multi-User Beamforming by Phase Con- trol,” Progress in Electromagnetics Research, PIER 60, pp. 95–106, 2006. [43] R. Vescovo, “Null Synthesis by Phase Control for Antenna Arrays,” Elec- tronics Letters, vol. 36, no. 3, pp. 198–199, 3rd Feb. 2000. [44] L.C. Godara, “Applications of Antenna Arrays to Mobile Communica- tions. I. Performance Improvement, Feasibility, and System Considera- tions,” Proceedings of the IEEE, vol. 85, no. 7, pp. 1031–1060, Jul. 1997. Bibliography 201

[45] P.H. Lehne and M. Pettersen, “An Overview of Smart Antenna Technol- ogy for Mobile Communications Systems,” IEEE Communications Sur- veys, vol. 2, no. 4, pp. 2–13, Fourth Quarter 1999. [46] H. Moody, “The Systematic Design of the Butler Matrix,” IEEE Trans- actions on Antennas and Propagation, vol. 12, no. 6, pp. 786–788, Nov. 1964. [47] J. Capon, “High-Resolution Frequency-Wavenumber Spectrum Analysis,” Proceedings of the IEEE, vol. 57, no. 8, pp. 1408–1418, Aug. 1969. [48] O.L. Frost III, “An Algorithm for Linearly Constrained Adaptive Array Processing,” Proceedings of the IEEE, vol. 60, no. 8, pp. 926–935, Aug. 1972. [49] S. Applebaum, “Adaptive Arrays,” IEEE Transactions on Antennas and Propagation, vol. 24, no. 5, pp. 585–598, 1976. [50] A.L. Swindlehurst and T. Kailath, “Azimuth/Elevation Using Regular Array Geometries,” IEEE Transactions on Aerospace and Electronic Systems, vol. 29, no. 1, pp. 145–156, Jan. 1993. [51] C.P. Mathews and M.D. Zoltowski, “Eigenstructure Techniques for 2-D Angle Estimation with Uniform Circular Arrays,” IEEE Transactions on Signal Processing, vol. 42, no. 9, pp. 2395–2407, Sep. 1994. [52] G. Long, F. Ling and J.G. Proakis, “The LMS Algorithm with Delayed Co- efficient Adaptation,” IEEE Transactions on Acoustic, Speech and Signal Processing, vol. 37, no. 9, pp. 1397–1405, Sep. 1989. [53] J. Fernandez, I.R. Corden and M. Barrett, “Adaptive Array Algorithms for Optimal Combining in Digital Mobile Communications Systems,” in IEE International Conference on Antennas and Propagation (ICAP), vol. 2, 1993, pp. 983–986. [54] D. Godard, “Self-Recovering Equalization and Carrier Tracking in Two- Dimensional Data Communication Systems,” IEEE Transactions on Com- munications, vol. 28, no. 11, pp. 1867–1875, Nov. 1980. [55] I. Chlamtac, M. Conti and J.J.-N. Liu, “Mobile Ad Hoc Networking: Im- peratives and Challenges,” Ad Hoc Networks, vol. 1, no. 1, pp. 13–64, Jul. 2003. [56] I.F. Akyildiz, X. Wang and W. Wang, “Wireless Mesh Networks: A Sur- vey,” Computer Networks, vol. 47, pp. 445–487, Jan. 2005. 202 Bibliography

[57] IEEE Standard for Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Area Networks (WPANs), IEEE Std 802.15.1, Jun. 2002.

[58] IEEE Standard for Wireless LAN Medium Access Control (MAC) and PHYsical Layer (PHY) Specifications, IEEE Std 802.11, Nov. 1997.

[59] IEEE Standard for Wireless LAN Medium Access Control (MAC) and PHYsical Layer (PHY) Specifications: High-Speed Physical Layer in the 5 GHz Band, IEEE Std 802.11a, Sep. 1999.

[60] IEEE Standard for Wireless LAN Medium Access Control (MAC) and PHYsical Layer (PHY) Specifications: High-Speed Physical Layer Exten- sion in the 2.4 GHz Band, IEEE Std 802.11b, Sep. 1999.

[61] IEEE Standard for Wireless LAN Medium Access Control (MAC) and PHYsical Layer (PHY) Specifications: Amendment 4: Further Higher Data Rate Extension in the 2.4 GHz Band, IEEE Std 802.11g, Jun. 2003.

[62] IEEE Standard for Wireless LAN Medium Access Control (MAC) and PHYsical Layer (PHY) Specifications: Amendment 8: Medium Access Con- trol (MAC) Quality of Service Enhancements, IEEE Std 802.11e, Nov. 2005.

[63] IEEE Standard for Wireless LAN Medium Access Control (MAC) and PHYsical Layer (PHY) Specifications: Amendment 6: Medium Access Con- trol (MAC) Security Enhancements, IEEE Std 802.11i, Jul. 2004.

[64] HT PHY Specification (Version 1.27), Enhanced Wireless Consortium, 23rd Dec. 2005.

[65] M.K.A. Aziz, A.R. Nix and P.N. Fletcher, “A Study of Performance and Complexity for IEEE 802.11n MIMO-OFDM GIS Solutions,” in IEEE In- ternational Conference on Communications (ICC), vol. 7, 20-24 Jun. 2004, pp. 3822–3826.

[66] M. Hu and J. Zhang, “MIMO Ad Hoc Networks with Spatial Diversity: Medium Access Control and Saturation Throughput,” in IEEE Conference on Decision and Control (CDC), vol. 3, 14-17 Dec. 2004, pp. 3301–3306.

[67] J.C. Mundarath, P. Ramanathan and B.D. Van Veen, “NULLHOC: a MAC Protocol for Adaptive Antenna Array Based Wireless Ad Hoc Networks in Multipath Environment,” in IEEE Global Telecommunications Conference (GLOBECOM), 29 Nov-3 Dec. 2004, pp. 2765–2769. Bibliography 203

[68] M. Park, R.W. Heath Jr. and S.M. Nettles, “Improving Throughput and Fairness for MIMO Ad Hoc Networks Using Antenna Selection Diversity,” in IEEE Global Telecommunications Conference (GLOBECOM), vol. 5, 29 Nov.-3 Dec. 2004, pp. 3363–3367.

[69] J.-S. Park, A. Nandan, M. Gerla and H. Lee, “SPACE-MAC: Enabling Spatial Reuse Using MIMO Channel-Aware MAC,” in IEEE International Conference on Communications (ICC), vol. 5, 16-20 May 2005, pp. 3642– 3646.

[70] T. Tang, M. Park, R.W. Heath Jr. and S.M. Nettles, “A Joint MIMO-OFDM Transceiver and MAC Design for Mobile Ad Hoc Networking,” in Interna- tional Workshop on Wireless Ad-Hoc Networks (IWWAN), 31 May-3 Jun. 2004, pp. 315–319.

[71] K. Sundaresan, R. Sivakumar, M.A. Ingram and T.-Y. Chang, “Medium Ac- cess Control in Ad hoc Networks with MIMO Links: Optimization Consid- erations and Algorithms,” IEEE Transactions on Mobile Computing, vol. 3, no. 4, pp. 350–365, Oct.-Dec 2004.

[72] ——, “A Fair Medium Access Control Protocol for Ad-Hoc Networks with MIMO Links,” in Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), vol. 4, 7-11 Mar. 2004, pp. 2559–2570.

[73] K. Sundaresan and R. Sivakumar, “A Unified MAC Layer Framework for Ad-hoc Networks with Smart Antennas,” in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 24-26 May 2004, pp. 244–255.

[74] D. Wang and U. Tureli, “Cross Layer Design for Broadband Ad Hoc Net- work with MIMO-OFDM,” in IEEE Workshop on Signal Processing Ad- vances in Wireless Communications (SPAWC), 5-8 Jun. 2005, pp. 630–634.

[75] T. Hunziker, J.L. Bordim, T. Ohira and S. Tanaka, “A CSMA/CA-Based Medium Access Scheme for Array Antenna-Enhanced Wireless Ad Hoc Networks,” in IEEE International Symposium on Wireless Communication Systems (ISWCS), 20-22 Sep. 2004, pp. 230–234.

[76] G. Bianchi, D. Messina, L. Scalia and I. Tinnirello, “A Space-Division Time-Division Multiple Access Scheme for High Throughput Provisioning in WLANs,” in IEEE International Conference on Communications (ICC), vol. 4, 16-20 May 2005, pp. 2728–2733. 204 Bibliography

[77] W.-T. Chen, T.-W. Ho and Y.-C. Chen, “An MAC Protocol for Wireless Ad-hoc Hetworks Using Smart Antennas,” in International Conference on Parallel and Distributed Systems (ICPADS), vol. 1, 20-22 Jul. 2005, pp. 446–452.

[78] R.R. Choudhury, X. Yang, R. Ramanathan and N.H. Vaidya, “Using Di- rectional Antennas for Medium Access Control in Ad Hoc Networks,” in ACM International Symposium on Mobile Ad Hoc Networking and Com- puting (MobiHoc), 23-28 Sep. 2003, pp. 98–107.

[79] ——, “On Designing MAC Protocols for Wireless Networks Using Direc- tional Antennas,” IEEE Transactions on Mobile Computing, vol. 5, no. 5, pp. 477–491, Sep.-Oct. 2006.

[80] R.R. Choudhury and N.H. Vaidya, “Deafness: A MAC Problem in Ad Hoc Networks when using Directional Antennas,” in IEEE International Con- ference on Network Protocols (ICNP), 5-8 Oct. 2004, pp. 283–292.

[81] T. ElBatt, T. Anderson and B. Ryu, “Performance Evaluation of Multi- ple Access Protocols for Ad hoc Networks Using Directional Antennas,” in IEEE Wireless Communications and Networking Conference (WCNC), vol. 2, 16-20 Mar. 2003, pp. 982–987.

[82] N.S. Fahmy, T.D. Todd and V. Kezys, “Ad Hoc Networks with Smart An- tennas Using IEEE 802.11-Based Protocols,” in IEEE International Con- ference on Communications (ICC), vol. 5, 28 Apr.-2 May 2002, pp. 3144– 3148.

[83] ——, “Distributed Power Control for Ad Hoc Networks with Smart Anten- nas,” in IEEE Vehicular Technology Conference (VTC), vol. 4, 24-28 Sep. 2002, pp. 2141–2144.

[84] K.H. Grace, J.A. Stine and R.C. Durst, “An Approach for Modestly Di- rectional Communications in Mobile Ad Hoc Networks,” in IEEE Interna- tional Conference on Computer Communications and Networks (ICCCN), 20-22 Oct. 2003, pp. 377–384.

[85] C.-C. Shen, C. Srisathapornphat and C. Jaikaeo, “A Busy-Tone Based Di- rectional MAC Protocol for Ad Hoc Networks,” in IEEE Military Commu- nications Conference (MILCOM), vol. 2, 7-10 Oct. 2002, pp. 1233–1238.

[86] Y.B. Ko, V. Shankarkumar and N.H. Vaidya, “Medium Access Control Pro- tocols Using Directional Antennas in Ad Hoc Networks,” in Annual Joint Bibliography 205

Conference of the IEEE Computer and Communications Societies (INFO- COM), vol. 1, 26-30 Mar. 2000, pp. 13–21.

[87] T. Korakis, G. Jakllari and L. Tassiulas, “A MAC Protocol for Full Ex- ploitation of Directional Antennas in Ad-hoc Wireless Networks,” in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), vol. 1, 1-3 Jun. 2003, pp. 98–107.

[88] D. Lal, R. Gupta and D.P. Agrawal, “Throughput Enhancement in Wire- less Ad Hoc Networks with Spatial Channels - A MAC Layer Perspec- tive,” in IEEE International Symposium on Computers and Communica- tions (ISCC), 1-4 Jul. 2002, pp. 421–428.

[89] D. Lal, T. Joshi and D.P. Agrawal, “Localized Transmission Scheduling for Spatial Multiplexing Using Smart Antennas in Wireless Adhoc Networks,” in IEEE Workshop on Local and Metropolitan Area Networks (LAN/MAN), 25-28 Apr. 2004, pp. 175–180.

[90] D. Lal, V. Jain, Q.-A. Zeng and D.P. Agrawal, “Performance Evaluation of Medium Access Control for Multiple-Beam Antenna Nodes in a Wireless LAN,” IEEE Transactions on Parallel and Distributed Systems, vol. 15, no. 12, pp. 1117–1129, Dec. 2004.

[91] T.M. Lin and J.J. Dai, “A Collision Free MAC Protocol Using Smart An- tenna in Ad Hoc Networks,” in IEEE Consumer Communications and Net- working Conference (CCNC), 5-8 Jan. 2004, pp. 301–306.

[92] K. Nagashima, M. Takata and T. Watanabe, “Evaluations of A Directional MAC Protocol for Ad Hoc Networks,” in IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW), 2004, pp. 678– 683.

[93] A. Nasipuri, Li Kai and U.R. Sappidi, “Power Consumption and Through- put in Mobile Ad Hoc Networks Using Directional Antennas,” in IEEE In- ternational Conference on Computer Communications and Networks (IC- CCN), 14-16 Oct. 2002, pp. 620–626.

[94] A. Nasipuri, S. Ye, J. You and R.E. Hiromoto, “A MAC Protocol for Mobile Ad Hoc Networks Using Directional Antennas,” in IEEE Wireless Commu- nications and Networking Conference (WCNC), vol. 3, 23-28 Oct. 2000, pp. 1214–1219.

[95] R. Ramanathan, J. Redi, C. Santivanez, D. Wiggins and S. Polit, “Ad Hoc Networking with Directional Antennas: A Complete System Solution,” 206 Bibliography

IEEE Journal on Selected Areas in Communications, vol. 23, no. 3, pp. 496–506, Mar. 2005.

[96] M. Takai, J. Martin, A. Ren and R. Bagrodia, “Directional Virtual Carrier Sensing for Directional Antennas in Mobile Ad Hoc Networks,” in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 9-11 Jun. 2002.

[97] M. Takata, K. Nagashima and T. Watanabe, “A Directional Antennas- Based Dual Mode MAC Protocol for Ad Hoc Networks,” in IEEE Inter- national Conference on Performance, Computing, and Communications (ICPCC), 2004, pp. 579–584.

[98] ——, “A Dual Access Mode MAC Protocol for Ad Hoc Networks Using Smart Antennas,” in IEEE International Conference on Communications (ICC), vol. 7, 20-24 Jun. 2004, pp. 4182–4186.

[99] M. Takata, M. Bandai and T. Watanabe, “An Extended Directional MAC for Location Information Staleness in Ad Hoc Networks,” in IEEE Inter- national Conference on Distributed Computing Systems Workshops (ICD- CSW), 6-10 Jun. 2005, pp. 899–905.

[100] Z. Zhang, “Pure Directional Transmission and Reception Algorithms in Wireless Ad Hoc Networks with Directional Antennas,” in IEEE Interna- tional Conference on Communications (ICC), vol. 5, 16-20 May 2005, pp. 3386–3390.

[101] ——, “DTRA: Directional Transmission and Reception Algorithms in WLANs with Directional Antennas for QoS Support,” IEEE Network, vol. 19, no. 3, pp. 27–32, May-Jun. 2005.

[102] S. Bandyopadhyay, K. Hasuike, S. Horisawa and S. Tawara, “An Adap- tive MAC Protocol for Wireless Ad Hoc Community Networks (WACNet) Using Electronically Steerable Passive Array Radiator Antenna,” in IEEE Global Telecommunications Conference (GLOBECOM), 25-29 Nov. 2001, pp. 2896–2900.

[103] W.T. Chen, M.S. Pan and J.J. Dai, “An Adaptive MAC Protocol for Wire- less Ad Hoc Networks Using Smart Antenna System,” in IEEE Vehicular Technology Conference (VTC), vol. 5, 6-9 Oct. 2003, pp. 2794–2798.

[104] N.S. Fahmy and T.D. Todd, “A Selective CSMA Protocol with Cooperative Nulling for Ad Hoc Networks with Smart Antennas,” in IEEE Wireless Bibliography 207

Communications and Networking Conference (WCNC), vol. 1, 21-25 Mar. 2004, pp. 387–392.

[105] D. Lal, R. Toshniwal, R. Radhakrisnan, D.P. Agrawal and J. Caffery, “A Novel MAC Layer Protocol for Space Division Multiple Access in Wire- less Ad Hoc Networks,” in IEEE International Conference on Computer Communications and Networks (ICCCN), 14-16 Oct. 2002, pp. 614–619.

[106] R. Radhakrishnan, D. Lai, J.Jr. Caffery and D.P. Agrawal, “Performance Comparison of Smart Antenna Techniques for Spatial Multiplexing in Wireless Ad Hoc Networks,” in IEEE International Symposium on Wire- less Personal Multimedia Communications (WPMC), 27-30 Oct. 2002, pp. 168–171.

[107] H. Singh and S. Singh, “A MAC Protocol Based on Adaptive Beamforming for Ad Hoc Networks,” in IEEE International Symposium on Personal, In- door and Mobile Radio Communications (PIMRC), vol. 2, 7-10 Sep. 2003, pp. 1346–1350.

[108] ——, “DOA-ALOHA: Slotted ALOHA for Ad Hoc Networking Using Smart Antennas,” in IEEE Vehicular Technology Conference (VTC), vol. 5, 6-9 Oct. 2003, pp. 2804–2808.

[109] ——, “Tone Based MAC Protocol for Use with Adaptive Array Antennas,” in IEEE Wireless Communications and Networking Conference (WCNC), vol. 2, 21-25 Mar. 2004, pp. 1246–1251.

[110] ——, “Smart-802.11b MAC Protocol for Use with Smart Antennas,” in IEEE International Conference on Communications (ICC), vol. 6, 20-24 Jun. 2004, pp. 3684–3688.

[111] J. Yang, J. Li and M. Sheng, “MAC Protocol for Mobile Ad Hoc Network with Smart Antennas,” Electronics Letters, vol. 39, no. 6, pp. 555–557, 20th Mar. 2003.

[112] J.Yang and J. Li, “A Novel Multiple Access Protocol for Mobile Ad Hoc Networks with Smart Antennas,” in IEEE Semiannual Vehicular Technol- ogy Conference (VTC Spring), vol. 3, 22-25 Apr. 2003, pp. 1768–1772.

[113] B. Jose, H. Yin, P. Mehrotra and E. Casas, “MAC layer Issues and Chal- lenges of using Smart Antennas with 802.11,” in IEEE Vehicular Technol- ogy Conference (VTC), vol. 5, 6-9 Oct. 2003, pp. 3169–3173. 208 Bibliography

[114] P. Gupta and P.R. Kumar, “The Capacity of Wireless Networks,” IEEE Transactions on Information Theory, vol. 46, no. 2, pp. 388–404, Mar. 2000.

[115] J. Li , C. Blake, D.S.J. De Couto, H.I. Lee and R. Morris, “Capacity of Ad Hoc Wireless Networks,” in ACM Annual International Conference on Mobile Computing and Networking (MobiCom), 01-03 Jun. 2001, pp. 61– 69.

[116] A. Spyropoulos and C.S. Raghavendra, “Asymptotic Capacity Bounds for Ad-Hoc Networks Revisited: The Directional and Smart Antenna Cases,” in IEEE Global Telecommunications Conference (GLOBECOM), vol. 3, 1- 5 Dec. 2003, pp. 1216–1220.

[117] ——, “Capacity Bounds for Ad-Hoc Networks Using Directional Anten- nas,” in IEEE International Conference on Communications (ICC), vol. 1, 11-15 May 2003, pp. 348–352.

[118] S. Yi , Y. Pei and S. Kalyanaraman, “On the Capacity Improvement of Ad Hoc Wireless Networks Using Directional Antennas,” in ACM Interna- tional Symposium on Mobile Ad Hoc Networking and Computing (Mobi- Hoc), 1-3 Jun. 2003, pp. 108–116.

[119] M. Grossglauser and D.N.C. Tse, “Mobility Increases the Capacity of Ad Hoc Wireless Networks,” IEEE Transactions on Networking, vol. 10, no. 4, pp. 477–486, Aug. 2002.

[120] S. Toumpis and A.J. Goldsmith, “Capacity Regions for Wireless Ad Hoc Networks,” IEEE Transactions on Wireless Communications, vol. 2, no. 4, pp. 736–748, Jul. 2003.

[121] R. Ebrahimrezagah and A. Mohammadi, “The Capacity of Wireless Ad Hoc Networks Using Statistical Techniques,” in IEEE International Con- ference on Communications (ICC), 11-15 Jun. 2006.

[122] M.M. Carvalho and J.J. Garcia-Luna-Aceves, “Modeling Wireless Ad Hoc Networks with Directional Antennas,” in Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), Apr 2006.

[123] Y. Wang and J.J. Garcia-Luna-Aceves, “Collision Avoidance in Single- Channel Ad Hoc Networks Using Directional Antennas,” in IEEE Inter- national Conference on Distributed Computing Systems (ICDCS), 19-22 May 2003, pp. 640–649. Bibliography 209

[124] J.A. Stine, “Exploiting Smart Antennas in Wireless Mesh Networks Using Contention Access,” IEEE Wireless Communications, vol. 13, no. 2, pp. 38–49, Apr. 2006. [125] J. del Prado Pavon and S. Choi, “Link Adaptation Strategy for IEEE 802.11 WLAN via Received Signal Strength Measurement,” in IEEE International Conference on Communications (ICC), vol. 2, 11-15 May 2003, pp. 1108– 1113. [126] S. Choudhury and J.D. Gibson, “Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading,” in IEEE Wireless Communica- tions and Networking Conference (WCNC), 3-6 Apr. 2006. [127] L.-C. Wang, S.-Y. Huang and A. Chen, “On the Throughput Performance of CSMA-based Wireless Local Area Network with Directional Antennas and Capture Effect: A Cross-layer Analytical Approach,” in IEEE Wireless Communications and Networking Conference (WCNC), vol. 3, Mar. 2004, pp. 1879–1884. [128] The ns Manual (ns Notes and Documentation), UC Berkeley, LBL, USC/ISI, and Xerox PARC, Aug. 2006. [129] J.I. Simoes, I. Stevanovic and A.K. Skrivervik, “Models for Simulating Switched Beam Antennas in Radio Planning,” in International Conference on Applied Electromagnetics And Communications (ICECom), 12-14 Oct. 2005. [130] K. Xu, M. Gerla and S.A. Bae, “How Effective is the IEEE 802.11 RTS/CTS Handshake in Ad Hoc Networks,” in Global Telecommunications Conference (GLOBECOM), vol. 1, 17-21 Nov. 2002, pp. 72–76. [131] C. Berrou and A. Glavieux, “Near Optimum Error Correcting Coding and Decoding: Turbo-Codes,” IEEE Transactions on Communications, vol. 44, no. 5, pp. 591–600, May 1996. [132] R.G. Gallager, “Low Density Parity-Check Codes,” IRE Transactions on Information Theory, vol. 8, pp. 602–608, 1962. [133] D.M. Ranking and T.A. Gulliver, “Single Parity Check Product Codes,” IEEE Transactions on Communications, vol. 49, no. 8, pp. 1354–1362, Aug. 2001. [134] J.S.K. Tee, D.P. Taylor and P.A. Martin, “Multiple Serial and Parallel Con- catenated Single Parity-Check Codes,” IEEE Transactions on Communica- tions, vol. 51, no. 10, pp. 1666–1675, Oct. 2003. 210 Bibliography

[135] D. Qiao, S. Choi and K.G. Shin, “Goodput Analysis and Link Adaptation for IEEE 802.11a Wireless LANs,” IEEE Transactions on Mobile Comput- ing, vol. 1, no. 4, pp. 278–292, Oct.-Dec. 2002.

[136] R.G. Gallager, “The Random Coding Bound is Tight for the Average Code (Corresp.),” IEEE Transactions on Information Theory, vol. IT-19, pp. 244– 246, Mar. 1973.

[137] F. Babich, “Design of Adaptive Systems for the Fading Channel Adopting Efficient Coded Modulations,” in IEEE International Conference on Com- munications (ICC), 11-15 Jun. 2006.

[138] F. Rayal, “Why Have Smart Antennas not yet Gained Traction with Wire- less Network Operators?” IEEE Antennas and Propagation Magazine, vol. 47, no. 6, pp. 124–126, Dec. 2005.

[139] T. Kaiser, “When Will Smart Antennas Be Ready for the Market? Part I - results,” IEEE Signal Processing Magazine, vol. 22, no. 2, pp. 87–92, Mar. 2005.

[140] ——, “When Will Smart Antennas Be Ready for the Market? Part II - results,” IEEE Signal Processing Magazine, vol. 22, no. 6, pp. 174–176, Nov. 2005.

[141] J.H. Winters, “Smart Antenna Techniques and Their Application to Wire- less Ad Hoc Networks,” IEEE Wireless Communications, vol. 13, no. 4, pp. 77–83, Aug. 2006.

[142] M. Zorzi, J. Zeidler, A. Anderson, B. Rao, J. Proakis, A.L. Swindlehurst, M. Jensen and S. Krishnamurthy, “Cross-Layer Issues in MAC Protocol Design for MIMO Ad Hoc Networks,” IEEE Wireless Communications, vol. 13, no. 4, pp. 62–76, Aug. 2006.

[143] M. Kim, “Hardware Implementation of Signal Processing in Smart An- tenna Systems for High Speed Wireless Communication,” Ph.D. disserta- tion, Department of Electrical and Computer Engineering, Yokohama Na- tional University, Yokohama, Japan, Dec. 2004.

[144] Ruckus Wireless, http://www.ruckuswireless.com/.

[145] F.E. Fakoukakis, S.G. Diamantis, A.P. Orfanides and G.A. Kyriaco, “De- velopment of an Adaptive and a Switched Beam Smart Antenna System for Wireless Communications,” in Progress in Electromagnetics Research Symposium (PIERS), 22-26 Aug. 2005, pp. 276–280. Bibliography 211

[146] G. Bianchi, “Performance Analysis of the IEEE 802.11 Distributed Coor- dination Function,” IEEE Journal on Selected Areas in Communications, vol. 18, no. 3, pp. 535–547, Mar. 2000.

[147] H. Wu, Y. Peng, K. Long and S. Cheng, “A Simple Model of IEEE 802.11 Wireless LAN,” in IEEE International Conferences on Info-tech and Info- net (ICII), vol. 2, 29 Oct.-1 Nov. 2001, pp. 514–519.

[148] P. Chatzimisios, A.C. Boucouvalas and V. Vitsas, “Influence of Channel BER on IEEE 802.11 DCF,” Electronics Letters, vol. 39, no. 23, pp. 1687– 1688, 13th Nov. 2003.

[149] ——, “Performance Analysis of IEEE 802.11 DCF in Presence of Trans- mission Errors,” in IEEE International Conference on Communications (ICC), vol. 7, 20-24 Jun. 2004, pp. 3854–3858.

[150] ——, “Effectiveness of RTS/CTS Handshake in IEEE 802.11a Wireless LANs,” Electronics Letters, vol. 40, no. 14, pp. 915–916, 8th Jul. 2004.

[151] Z. Hadzi-Velkov and B. Spasenovski, “Saturation Throughput - Delay Analysis of IEEE 802.11 DCF in Fading Channel,” in IEEE International Conference on Communications (ICC), vol. 1, 11-15 May 2003, pp. 121– 126.

[152] D. Malone, K. Duffy and D. Leith, “Modeling the 802.11 Distributed Coor- dination Function in Nonsaturated Heterogeneous Conditions,” IEEE/ACM Transactions on Networking, vol. 15, no. 1, pp. 159–172, Feb. 2007.

[153] K. Duffy and A.J. Ganesh, “Modeling the Impact of Buffering on 802.11,” IEEE Communications Letters, vol. 11, no. 2, pp. 219–221, Feb. 2007.

[154] M. Ergen and P. Varaiya, “Throughput Analysis and Admission Control for IEEE 802.11a,” ACM/Kluwer Mobile Networks and Applications, vol. 10, no. 5, pp. 705–716, Oct. 2005.

[155] G. R. Cantieni, Q. Ni, C. Barakat and T. Turletti, “Performance Analysis under Finite Load and Improvements for Multirate 802.11,” Compututer Communications, vol. 28, no. 10, pp. 1095—-1109, Jun. 2005.

[156] S. Bates, “On Edges and Connectivity in Ad Hoc Networks,” in IEEE Global Telecommunications Conference (GLOBECOM), vol. 6, 29 Nov.- 3 Dec. 2004, pp. 3588–3593. 212 Bibliography

[157] G. Bianchi, L. Fratta and M. Oliveri, “Performance Evaluation and En- hancement of the CSMA/CA MAC Protocol for 802.11 Wireless LANs,” in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), vol. 2, 15-18 Oct. 1996, pp. 392–396.

[158] V. Erceg et al., “TGn Channel Models,” IEEE P802.11, 802.11-03/940r4, Tech. Rep., 2004.

[159] O. Besson and P. Stoica, “Decoupled Estimation of DOA and Angular Spread for Spatially Distributed Sources,” in IEEE Asilomar Conference on Signals, Systems, and Computers (ACSSC), vol. 1, 24-27 Oct. 1999, pp. 253–257.

[160] H. Wheeler, “The Grating-Lobe Series for the Impedance Variation in a Planar Phased-Array Antenna,” IEEE Transactions on Antennas and Prop- agation, vol. 14, no. 6, pp. 707–714, Nov. 1966.

[161] R. Das, “Concentric Ring Array,” IEEE Transactions on Antennas and Propagation, vol. 14, no. 3, pp. 398–400, May 1966.

[162] J. Gu, H. Stark and Y. Yang, “Wide-Band Smart Antenna Design Using Vector Space Projection Methods,” IEEE Transactions on Antennas and Propagation, vol. 52, no. 12, pp. 3228–3236, Dec. 2004.

[163] O.M. Bucci, G. Franceschetti, G. Mazzarella and G. Panariello, “Intersec- tion Approach to Array Pattern Synthesis,” Proceedings of the IEE, vol. 137, no. 6, pp. 349–357, Dec. 1990.

[164] R. Vescovo, “Power Pattern Synthesis for Antenna Arrays with Null Con- straints in the Near-Field Region,” Microwave and Optical Technology Let- ters, vol. 44, no. 6, pp. 542–545, 20th Mar. 2005.

[165] ——, “Null Formation with Excitation Constraints in the Pattern Synthesis for Circular Arrays of Antennas,” Electromagnetics, vol. 21, no. 3, pp. 213– 230, 1st Apr. 2001.

[166] ——, “Null Control for Linear Arrays by Phase-only or Amplitude Only Modification of the Excitations,” in IEEE Antennas and Propagation Soci- ety International Symposium (APS), vol. 3, 11-16 Jul. 1999, pp. 2044–2047.

[167] ——, “Constrained and Unconstrained Synthesis of Array Factor for Cir- cular Arrays,” IEEE Transactions on Antennas and Propagation, vol. 43, no. 12, pp. 1405–1410, 1995. Bibliography 213

[168] T.J. Peters, “Phase-Only Synthesis for Multiple Beam Phased Arrays with Element Failures,” in IEEE Antennas and Propagation Society Interna- tional Symposium (APS), vol. 3, 18-25 Jul. 1992, pp. 1352–1355.

[169] E. Lier, D. Purdy and K. Maalouf, “Study of Deployed and Modular Active Phased-Array Multibeam Satellite Antenna,” IEEE Antennas and Propaga- tion Magazine, vol. 45, no. 5, pp. 34 – 45, Oct. 2003.

[170] C.P.-Baliarda and R. Pous, “Fractal Design of Multiband and Low Side- Lobe Arrays,” IEEE Transactions on Antennas and Propagation, vol. 44, no. 5, pp. 730–739, May 1996.

List of publications

Conference proceedings

[171] F. Babich, M. Comisso, M. D’Orlando and L. Manià, “Performance Evalua- tion of MANETs Using Smart Antennas in Multipath Fading Environment,” in 2nd IEEE International Symposium on Wireless Communication Systems (ISWCS), Siena (Italy), 5-7 Sep. 2005, pp. 327–331.

[172] 1M. Comisso, F. Babich, M. D’Orlando and L. Manià, “Simultaneous Com- munications in Ad-Hoc Networks Using Smart Antennas in Multipath Envi- ronment,” in IEEE Global Telecommunications Conference (GLOBECOM), San Francisco, California (USA), 27 Nov.-1 Dec. 2006.

[173] F. Babich, M. Comisso and L. Manià, “Multi-Antenna Techniques for Wire- less Mesh Networks in an Outdoor Environment,” in IEEE International Conference on Communications (ICC), Glasgow, Scotland (UK), 24-27 Jun. 2007, pp. 4961–4966.

[174] F. Babich and M. Comisso, “Channel Coding and Multi-Antenna Tech- niques for Distributed Wireless Networks,” in IEEE Global Telecommuni- cations Conference (GLOBECOM), Washington, DC (USA), 26-30 Nov. 2007, pp. 4180–4184.

[175] F. Babich and M. Comisso, “Throughput Maximization in 802.11 Wire- less Networks Employing Adaptive Antenna Arrays,” in IEEE International Conference on Communications (ICC), Beijing, China, 19-23 May 2008.

1Best student paper award finalist

215 216 List of publications

Journal papers

[176] F. Babich, M. Comisso, M. D’Orlando and L. Manià, “Interference Miti- gation on WLANs Using Smart Antennas,” Wireless Personal Communica- tions, vol. 36, no. 4, pp. 387–401, Mar. 2006.

[177] M. Comisso and R. Vescovo, “Exploitation of Spatial Channel Model for Antenna Array Synthesis” Electronics Letters, vol. 42, no. 19, pp. 1079– 1080, 14th Sep. 2006.

[178] M. Comisso and R. Vescovo, “Multi-Beam Synthesis with Null Constraints by Phase Control for Antenna Arrays of Arbitrary Geometry,” Electronics Letters, vol. 43, no. 7, pp. 374–375, 29th Mar. 2007.

[179] F. Babich, M. Comisso, M. D’Orlando and L. Manià, “Performance Evalua- tion of Distributed Wireless Networks Using Smart Antennas in Low-Rank Channel,” IEEE Transactions on Communications, vol. 55, no. 7, pp. 1344– 1353, Jul. 2007.

[180] F. Babich, M. Comisso and L. Manià, “Sustainable Simultaneous Commu- nications in Ad-Hoc Networks Using Smart Antenna Systems,” ACM Wire- less Networks, accepted for publication.

[181] F. Babich, M. Comisso and L. Manià, “Performance Comparison of Ad- vanced Antenna Systems for Wireless Mesh Routers in an Outdoor Envi- ronment,” submitted to International Journal of Wireless and Mobile Com- puting.

[182] F. Babich and M. Comisso, “Throughput and Delay Analysis of 802.11- Based Wireless Networks Using Smart and Directional Antennas,” IEEE Transactions on Communications, accepted for publication.